Skip to main content


AI and Security

  1. Content type: Research

    Exploitability assessment of vulnerabilities is important for both defenders and attackers. The ultimate way to assess the exploitability is crafting a working exploit. However, it usually takes tremendous hou...

    Authors: Yan Wang, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong and Wei Zou

    Citation: Cybersecurity 2019 2:12

    Published on:

  2. Content type: Research

    The popularity of cloud hosting services also brings in new security chal- lenges: it has been reported that these services are increasingly utilized by miscreants for their malicious online activities. Mitiga...

    Authors: Xiaojing Liao, Sumayah Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao and Raheem Beyah

    Citation: Cybersecurity 2018 1:14

    Published on:

  3. Content type: Research

    Malware detection has become mission sensitive as its threats spread from computer systems to Internet of things systems. Modern malware variants are generally equipped with sophisticated packers, which allow ...

    Authors: Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin and Qixin Wu

    Citation: Cybersecurity 2018 1:10

    Published on:

  4. Content type: Survey

    Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning. E...

    Authors: Lu Sun, Mingtian Tan and Zhe Zhou

    Citation: Cybersecurity 2018 1:9

    Published on: