Adversarial Artificial Intelligence
Research on developing robust and secure AI systems against malicious attacks
AI systems can be fooled by adversarial attacks—carefully crafted inputs that cause wrong predictions. As AI powers healthcare, finance, and autonomous systems, protecting against manipulation is critical. We develop defenses that work across multiple domains.
Research Focus
Network Security
Encrypted traffic analysis detecting anomalies without breaking encryption. Real-time threat identification.
Mobile Security
Android malware detection resistant to evasion. Works even when attackers know our methods.
Healthcare AI
Medical diagnosis maintaining accuracy under attack. Patient prediction models resistant to manipulation.
Social Networks
Coordinated campaign detection. Bot identification and misinformation tracking.
Technical Approaches
Threat Detection
AI systems that identify adversarial patterns in encrypted traffic, mobile applications, and network communications. Zero-day attack detection using contrastive learning methods.
Robust Architecture
Privacy-preserving machine learning that protects data while maintaining model performance. System hardening protocols for mobile and network infrastructure.
Testing and Evaluation
Comprehensive adversarial testing frameworks. Performance metrics that measure resilience under attack conditions.
Impact
Our research contributes to securing AI systems in critical applications. Work includes encrypted traffic classification with high accuracy, mobile malware detection systems, and healthcare AI that maintains reliability under adversarial conditions.
Related Publications
2026
- Uncovering Microservice Faults: A Temporal Graph Approach to Root Cause Analysis2026Proceedings of the IEEE International Conference on Communications. ICC 2026
- 2026Computer Networks
- Cleaner Adversarial CAPTCHAs: Intelligent Targets and Precise Noise for Usable Security2026Proceedings of the 25th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2026)
2025
- Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services’ User Anomalies2025Proceedings of the 34th International Conference on Computer Communications and Networks
- Optimized File Type Detection and One-Shot Reclassification Model2025Proceedings of the IEEE International Conference on Communications
- A New D-MAGIC: Dynamic Model for Cybersecurity Attack Detection Using GNNs into Clustering2025Proceedings of the IEEE International Conference on Communications
- PQClass: Classification of Post-Quantum Encryption Applications in Internet Traffic2025Proceedings of the IEEE International Conference on Communications
- Leveraging OSINT for Advanced Proactive Cybersecurity: Strategies and Solutions2025IEEE Access
2024
- Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services’ User Anomalies2024arXiv preprint arXiv:2409.12726
- Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning2024arXiv preprint arXiv:2405.11258
- Extending Limited Datasets with GAN-Like Self-Supervision for SMS Spam Detection2024Computers & Security
2023
- Breaking the Structure of MaMaDroid2023Expert Systems with Applications
- Adversarial Examples for Captcha Generation Adversarial Machine Learning for Social Good2023Available at SSRN 4608639
- Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning2023Electronics
2022
- MaMaDroid2.0–The Holes of Control Flow Graphs2022arXiv preprint arXiv:2202.13922
- Problem-Space Evasion Attacks in the Android OS: A Survey2022arXiv preprint arXiv:2205.14576
- Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks2022arXiv preprint arXiv:2205.04293
- Less Is More: Robust and Novel Features for Malicious Domain Detection2022Electronics
- MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification20222022 IEEE 19th annual consumer communications & networking conference (CCNC)
2021
- Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier2021IEEE Access
- Robust Coordination in Adversarial Social Networks: From Human Behavior to Agent-Based Modeling2021Network Science
2020
- Evasion Is Not Enough: A Case Study of Android Malware2020arXiv preprint arXiv:2003.14123
- Encrypted Video Traffic Clustering Demystified2020Computers & Security
- Evasion Is Not Enough: A Case Study of Android Malware2020International symposium on cyber security cryptography and machine learning
- Robust Malicious Domain Detection2020Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be’er Sheva, Israel, July 2–3, 2020, Proceedings 4
2019
- Adversarial Coordination on Social Networks2019Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems
- Improving Robustness of ML Classifiers Against Realizable Evasion Attacks Using Conserved Features201928th USENIX Security Symposium (USENIX Security 19)
2018
- Adversarial task assignment2018International Joint Conference on Artificial Intelligence