Adversarial detection with model interpretation

N Liu, H Yang, X Hu - Proceedings of the 24th ACM SIGKDD …, 2018 - dl.acm.org
Machine learning (ML) systems have been increasingly applied in web security applications
such as spammer detection, malware detection and fraud detection. These applications …

Ml-loo: Detecting adversarial examples with feature attribution

P Yang, J Chen, CJ Hsieh, JL Wang… - Proceedings of the AAAI …, 2020 - aaai.org
Deep neural networks obtain state-of-the-art performance on a series of tasks. However,
they are easily fooled by adding a small adversarial perturbation to the input. The …

Detecting adversarial examples is (nearly) as hard as classifying them

F Tramer - International Conference on Machine Learning, 2022 - proceedings.mlr.press
Making classifiers robust to adversarial examples is challenging. Thus, many works tackle
the seemingly easier task of detecting perturbed inputs. We show a barrier towards this goal …

On the (statistical) detection of adversarial examples

K Grosse, P Manoharan, N Papernot, M Backes… - arXiv preprint arXiv …, 2017 - arxiv.org
Machine Learning (ML) models are applied in a variety of tasks such as network intrusion
detection or Malware classification. Yet, these models are vulnerable to a class of malicious …

Adversarial machine learning applied to intrusion and malware scenarios: a systematic review

N Martins, JM Cruz, T Cruz, PH Abreu - IEEE Access, 2020 - ieeexplore.ieee.org
Cyber-security is the practice of protecting computing systems and networks from digital
attacks, which are a rising concern in the Information Age. With the growing pace at which …

[HTML][HTML] Deep neural rejection against adversarial examples

A Sotgiu, A Demontis, M Melis, B Biggio… - EURASIP Journal on …, 2020 - Springer
Despite the impressive performances reported by deep neural networks in different
application domains, they remain largely vulnerable to adversarial examples, ie, input …

On the empirical effectiveness of unrealistic adversarial hardening against realistic adversarial attacks

S Dyrmishi, S Ghamizi, T Simonetto… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
While the literature on security attacks and defenses of Machine Learning (ML) systems
mostly focuses on unrealistic adversarial examples, recent research has raised concern …

Objective metrics and gradient descent algorithms for adversarial examples in machine learning

U Jang, X Wu, S Jha - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Fueled by massive amounts of data, models produced by machine-learning (ML) algorithms
are being used in diverse domains where security is a concern, such as, automotive …

[图书][B] Adversarial machine learning

Y Vorobeychik, M Kantarcioglu - 2022 - books.google.com
The increasing abundance of large high-quality datasets, combined with significant
technical advances over the last several decades have made machine learning into a major …

Adversarial examples for malware detection

K Grosse, N Papernot, P Manoharan, M Backes… - … –ESORICS 2017: 22nd …, 2017 - Springer
Abstract Machine learning models are known to lack robustness against inputs crafted by an
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …