Poisoning attacks against feature-based image classification

R Mayerhofer, R Mayer - Proceedings of the Twelfth ACM Conference on …, 2022 - dl.acm.org
Adversarial machine learning and the robustness of machine learning is gaining attention,
especially in image classification. Attacks based on data poisoning, with the aim to lower the …

An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers

A Reddy, S Venkatesan, R Izmailov… - MILCOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) models are being adopted as state of the art tools to defend systems
against cybersecurity threats. Despite their high accuracy, such models remain vulnerable to …

Adversarial Machine Learning Attacks in Internet of Things Systems

R Kone, O Toutsop, KW Thierry… - 2022 IEEE Applied …, 2022 - ieeexplore.ieee.org
Researchers are looking into solutions to support the enormous demand for wireless
communication, which has been exponentially increasing along with the growth of …

Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability

MM Alani, A Mashatan, A Miri - Proceedings of the 10th ACM Cyber …, 2024 - dl.acm.org
The growing popularity of Internet-of-Things devices makes them a desired target for
malicious actors. Most attacks start with a reconnaissance phase where the attacker gathers …

[HTML][HTML] AdVulCode: Generating Adversarial Vulnerable Code against Deep Learning-Based Vulnerability Detectors

X Yu, Z Li, X Huang, S Zhao - Electronics, 2023 - mdpi.com
Deep learning-based vulnerability detection models have received widespread attention;
however, these models are susceptible to adversarial attack, and adversarial examples are …

Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures

W Zheng, K Omote - … Conference on Trust, Security and Privacy …, 2022 - ieeexplore.ieee.org
In recent years, machine learning technology has been extensively utilized, leading to
increased attention to the security of AI systems. In the field of image recognition, an attack …

Adversarial attacks on malware detection models for smartphones using reinforcement learning: PhD forum abstract

H Rathore - Proceedings of the 18th Conference on Embedded …, 2020 - dl.acm.org
Malware analysis and detection is a rat race between malware designer and anti-malware
community. Most of the current Smartphone antivirus (s) are based on the signature …

Adversarial malware binaries: Evading deep learning for malware detection in executables

B Kolosnjaji, A Demontis, B Biggio… - 2018 26th European …, 2018 - ieeexplore.ieee.org
Machine learning has already been exploited as a useful tool for detecting malicious
executable files. Data retrieved from malware samples, such as header fields, instruction …

Exploiting windows pe structure for adversarial malware evasion attacks

K Aryal, M Gupta, M Abdelsalam - … of the Thirteenth ACM Conference on …, 2023 - dl.acm.org
The last decade has seen phenomenal growth in the application of machine learning. At this
point, it won't be wrong to claim that most technological change is directly or indirectly …

POSTER: On searching information leakage of Python model execution to detect adversarial examples

CY Guo, F Yu - Proceedings of the 2023 ACM Asia Conference on …, 2023 - dl.acm.org
The predictive capabilities of machine learning models have improved significantly in recent
years, leading to their widespread use in various fields. However, these models remain …