ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.05005
  4. Cited By
Adversarial Attacks on Machine Learning Cybersecurity Defences in
  Industrial Control Systems

Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

Journal of Information Security and Applications (JISA), 2020
10 April 2020
Eirini Anthi
Lowri Williams
Matilda Rhode
Pete Burnap
Adam Wedgbury
    AAML
ArXiv (abs)PDFHTML

Papers citing "Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems"

11 / 11 papers shown
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
Devon A. Kelly
Christiana Chamon
110
0
0
25 Oct 2025
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability
Anass Grini
Oumaima Taheri
Btissam El Khamlichi
Amal El Fallah-Seghrouchni
AAML
319
2
0
02 May 2025
Adversarial Challenges in Network Intrusion Detection Systems: Research
  Insights and Future Prospects
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future ProspectsIEEE Access (IEEE Access), 2024
Sabrine Ennaji
Fabio De Gaspari
Dorjan Hitaj
Alicia Kbidi
Luigi V. Mancini
AAML
594
32
0
27 Sep 2024
Development of an Edge Resilient ML Ensemble to Tolerate ICS Adversarial
  Attacks
Development of an Edge Resilient ML Ensemble to Tolerate ICS Adversarial Attacks
Likai Yao
Qinxuan Shi
Zhanglong Yang
Sicong Shao
Salim Hariri
AAML
286
0
0
26 Sep 2024
Black-box Adversarial Transferability: An Empirical Study in
  Cybersecurity Perspective
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective
Khushnaseeb Roshan
Aasim Zafar
AAML
230
17
0
15 Apr 2024
Attacks Against Mobility Prediction in 5G Networks
Attacks Against Mobility Prediction in 5G Networks
Syafiq Al Atiiq
Yachao Yuan
Christian Gehrmann
Jakob Sternby
Luis Barriga
AAML
181
3
0
29 Feb 2024
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network
  Intrusion Detection
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion DetectionComputers & security (Comput. Secur.), 2023
João Vitorino
Isabel Praça
Eva Maia
AAML
286
37
0
13 Aug 2023
Towards Adversarial Realism and Robust Learning for IoT Intrusion
  Detection and Classification
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification
João Vitorino
Isabel Praça
Eva Maia
AAML
432
36
0
30 Jan 2023
Addressing Adversarial Machine Learning Attacks in Smart Healthcare
  Perspectives
Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives
A. Selvakkumar
S. Pal
Zahra Jadidi
AAML
194
20
0
16 Dec 2021
Modeling Realistic Adversarial Attacks against Network Intrusion
  Detection Systems
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
Giovanni Apruzzese
M. Andreolini
Luca Ferretti
Mirco Marchetti
M. Colajanni
AAML
359
147
0
17 Jun 2021
Adversarial Machine Learning Attacks on Condition-Based Maintenance
  Capabilities
Adversarial Machine Learning Attacks on Condition-Based Maintenance Capabilities
Hamidreza Habibollahi Najaf Abadi
AAML
149
3
0
28 Jan 2021
1
Page 1 of 1