L Huang, AD Joseph, B Nelson… - Proceedings of the 4th …, 2011 - dl.acm.org
… Finally, we explored approaches and challenges for privacypreserving learning, including differential privacy, exploratory and causative privacy attacks, and randomization. …
… Papers in this special issue provide an initial taxonomy of adversarial attacks and a sampling of approaches used by adversaries to defeat current methods and by defenders to create …
… on adversarial attacks against security solutions based on machinelearning techniques and … attacks), showing that additional research is needed for this approach to be practical in real-…
Y Zhou, M Kantarcioglu, B Xi - Wiley Interdisciplinary Reviews …, 2019 - Wiley Online Library
… Figure 1 illustrates an example of adversarial attacks against a trained classifier. On the left, we show a normal machinelearning task of classifying samples into two classes, and the …
… of machinelearningapproaches in adversarial settings and to develop techniques to make learning robust to adversarial … an overview of standard machinelearningapproaches, with a …
… that targets MachineLearning (ML) and Deep Learning (DL) … are termed in literature as AdversarialMachineLearning (AML) [… a new approach to generate adversarial examples. The …
… Indeed, unlike the overwhelming majority of works that study the behavior of NIDS in an adversarial environment and focus on deep learningapproaches, this paper focuses on shallow …
… machinelearningapproaches are being widely employed [64]. Malware detection follows a similar approach… A downside of using machinelearning techniques to perform classifications …
… of secure machinelearning; more specifically, it looks at learning mechanisms in adversarial … book, we present a systematic approach for identifying and analyzing threats to a machine …