Adversarial machine learning in malware detection: Arms race between evasion attack and defense

L Chen, Y Ye, T Bourlai - 2017 European intelligence and …, 2017 - ieeexplore.ieee.org
… To simulate the evasion attack, we rank each API call and group them into two sets: M (those
highly relevant to malware) and B (those highly relevant to benign files) in the descent …

Arra: Absolute-relative ranking attack against image retrieval

S Li, X Xu, Z Zhou, Y Yang, G Wang… - Proceedings of the 30th …, 2022 - dl.acm.org
attack scenario. Specifically, we propose two compatible goals for the query-based attack, ie,
absolute ranking attack and relative ranking attack… assign the specific ranks to chosen candi…

Adversarial attacks on an oblivious recommender

K Christakopoulou, A Banerjee - … of the 13th ACM Conference on …, 2019 - dl.acm.org
… of attacks where we explicitly target the top-K recommendations; our machine learning approach
… ity of a low-rank recommender to these learned attacks, serving as further motivation for …

Frl: Federated rank learning

H Mozaffari, V Shejwalkar, A Houmansadr - arXiv preprint arXiv …, 2021 - arxiv.org
learning (FL) allows mutually untrusted clients to collaboratively train a common machine
learning … Under this threat model we design a worst case attack on FRL (Algorithm 3), which …

An analysis of untargeted poisoning attack and defense methods for federated online learning to rank systems

S Wang, G Zuccon - Proceedings of the 2023 ACM SIGIR International …, 2023 - dl.acm.org
machine learning models in a distributed way without the need of data sharing, they can be
susceptible to attacks that … In this paper, we consider attacks on FOLTR systems that aim to …

Defending against saddle point attack in Byzantine-robust distributed learning

D Yin, Y Chen, R Kannan… - … on Machine Learning, 2019 - proceedings.mlr.press
… complicated machine learning models often requires finding a local minimum of non-convex
functions, as exemplified by training deep neural networks and other high-capacity learning

Ranking loss: Maximizing the success rate in deep learning side-channel analysis

G Zaid, L Bossuet, F Dassance, A Habrard… - IACR Transactions on …, 2021 - tches.iacr.org
learning to rankattack was introduced by [CRR03], but their proposal was limited by the
computational complexity. Very similar to profiled attacks, the application of machine learning

[PDF][PDF] Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation.

A Ain, MH Bhuyan, DK Bhattacharyya… - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
… His research interests are in natural language processing, machine learning, artificial
intelligence, bioinformatics and applications of AI techniques to computer and network security. He …

Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics

H Brama, L Dery, T Grinshpoun - International Journal of Information …, 2023 - Springer
… [15], many machine learning performance measures are not suitable in the context of security,
since they may provide insufficient estimations or obscure experimental results. In addition…

RPL rank based‐attack mitigation scheme in IoT environment

MA Boudouaia, A Abouaissa… - International Journal …, 2021 - Wiley Online Library
… a Rank attack named DCB-Attack that targets the latter process in RPL topologies is proposed.
This mechanism uses a trust threshold based on the ranks … , lightweight machine learning-…