Adversarial machine learning at scale

A Kurakin, I Goodfellow, S Bengio - arXiv preprint arXiv:1611.01236, 2016 - arxiv.org
… a machine learning system M and input sample C which we call a clean example. Let’s assume
that sample C is correctly classified by the machine learning … We found that our approach

Adversarial machine learning

L Huang, AD Joseph, B Nelson… - Proceedings of the 4th …, 2011 - dl.acm.org
… Finally, we explored approaches and challenges for privacypreserving learning,
including differential privacy, exploratory and causative privacy attacks, and randomization. …

Machine learning in adversarial environments

P Laskov, R Lippmann - Machine learning, 2010 - Springer
… Papers in this special issue provide an initial taxonomy of adversarial attacks and a sampling
of approaches used by adversaries to defeat current methods and by defenders to create …

Adversarial machine learning attacks and defense methods in the cyber security domain

I Rosenberg, A Shabtai, Y Elovici… - ACM Computing Surveys …, 2021 - dl.acm.org
… on adversarial attacks against security solutions based on machine learning techniques and
… attacks), showing that additional research is needed for this approach to be practical in real-…

A survey of game theoretic approach for adversarial machine learning

Y Zhou, M Kantarcioglu, B Xi - Wiley Interdisciplinary Reviews …, 2019 - Wiley Online Library
… Figure 1 illustrates an example of adversarial attacks against a trained classifier. On the
left, we show a normal machine learning task of classifying samples into two classes, and the …

[图书][B] Adversarial machine learning

Y Vorobeychik, M Kantarcioglu - 2022 - books.google.com
… of machine learning approaches in adversarial settings and to develop techniques to make
learning robust to adversarial … an overview of standard machine learning approaches, with a …

Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
… that targets Machine Learning (ML) and Deep Learning (DL) … are termed in literature as
Adversarial Machine Learning (AML) [… a new approach to generate adversarial examples. The …

Adversarial machine learning for network intrusion detection: A comparative study

H Jmila, MI Khedher - Computer Networks, 2022 - Elsevier
… Indeed, unlike the overwhelming majority of works that study the behavior of NIDS in an
adversarial environment and focus on deep learning approaches, this paper focuses on shallow …

Adversarial machine learning applied to intrusion and malware scenarios: a systematic review

N Martins, JM Cruz, T Cruz, PH Abreu - IEEE Access, 2020 - ieeexplore.ieee.org
machine learning approaches are being widely employed [64]. Malware detection follows a
similar approach… A downside of using machine learning techniques to perform classifications …

[图书][B] Adversarial machine learning

AD Joseph, B Nelson, BIP Rubinstein, JD Tygar - 2018 - books.google.com
… of secure machine learning; more specifically, it looks at learning mechanisms in adversarial
… book, we present a systematic approach for identifying and analyzing threats to a machine