Projective ranking-based gnn evasion attacks

H Zhang, X Yuan, C Zhou, S Pan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… and the projective ranking method. We aim to learn a powerful attack strategy then adapt it
… In our method, based on mutual information, we rank and assess the attack benefits of each …

Power analysis attack: an approach based on machine learning

L Lerman, G Bontempi… - International Journal of …, 2014 - inderscienceonline.com
In cryptography, a side-channel attack is any attack based on … the way to the adoption of
machine learning techniques, ie, … This paper explores the use of machine learning techniques …

Topic-oriented Adversarial Attacks against Black-box Neural Ranking Models

YA Liu, R Zhang, J Guo, M de Rijke, W Chen… - Proceedings of the 46th …, 2023 - dl.acm.org
… Our attack can be seen as a typical case of universal attacks in IR, ie, a single document …
Reinforcement learning. Reinforcement learning (RL) [50] is a widely used machine learning

Learning How to Rank and Collecting User Behavior

P Kar, M Roy, S Datta - Recommender Systems: Algorithms and their …, 2024 - Springer
rankings, one needs to design an appropriate weighted function and train the machine learning
… type of attack are random attack, average attack, bandwagon attack, reverse bandwagon …

LtRFT: Mitigate the low-rate data plane DDoS attack with learning-to-rank enabled flow tables

D Tang, Y Yan, C Gao, W Liang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… We selected a series of traditional machine learning models for comparative experiments,
and the detailed comparison is shown in Table 5. We concluded that pairwise-based XgB-LtR …

Rank-Based Losses in Machine Learning and Deep Learning

S Hu - 2022 - search.proquest.com
attack top-k multi-label learning-based image annotation systems (TkML-AP). Our methods
explicitly consider the top-k ranking … proposed as a new learning objective for improving the …

Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset

J Foley, N Moradpoor, H Ochenyi - Security and …, 2020 - Wiley Online Library
… results, our machine learning approach is successful in detecting combined attacks against
two … For this, we considered combined attacks such as Rank and Version Attack, Rank and …

Projective ranking: A transferable evasion attack method on graph neural networks

H Zhang, B Wu, X Yang, C Zhou, S Wang… - Proceedings of the 30th …, 2021 - dl.acm.org
attack method named projective ranking to overcome the above limitations. Our idea is to
learn a powerful attack … and rank them accordingly, so the learned attack strategy has better …

Manipulating machine learning: Poisoning attacks and countermeasures for regression learning

M Jagielski, A Oprea, B Biggio, C Liu… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
As machine learning becomes widely used for automated decisions, attackers have … machine
learning algorithms. In this paper, we perform the first systematic study of poisoning attacks

{AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning

J Jia, NZ Gong - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
… In our experiments, we tried a low-rank approximation based method to detect noise and
AttriGuard is still effective against the method. However, we acknowledge that this does not …