Multiple classifier systems for robust classifier design in adversarial environments

B Biggio, G Fumera, F Roli - … Journal of Machine Learning and Cybernetics, 2010 - Springer
Pattern recognition systems are increasingly being used in adversarial environments like
network intrusion detection, spam filtering and biometric authentication and verification …

Security evaluation of pattern classifiers under attack

B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …

Adversarial pattern classification using multiple classifiers and randomisation

B Biggio, G Fumera, F Roli - … and Statistical Pattern Recognition: Joint IAPR …, 2008 - Springer
In many security applications a pattern recognition system faces an adversarial classification
problem, in which an intelligent, adaptive adversary modifies patterns to evade the classifier …

Multiple classifier systems for adversarial classification tasks

B Biggio, G Fumera, F Roli - … , MCS 2009, Reykjavik, Iceland, June 10-12 …, 2009 - Springer
Pattern classification systems are currently used in security applications like intrusion
detection in computer networks, spam filtering and biometric identity recognition. These are …

Bagging classifiers for fighting poisoning attacks in adversarial classification tasks

B Biggio, I Corona, G Fumera, G Giacinto… - … Classifier Systems: 10th …, 2011 - Springer
Pattern recognition systems have been widely used in adversarial classification tasks like
spam filtering and intrusion detection in computer networks. In these applications a …

Adversarial examples in the physical world

A Kurakin, IJ Goodfellow, S Bengio - Artificial intelligence safety …, 2018 - taylorfrancis.com
Most existing machine learning classifiers are highly vulnerable to adversarial examples. An
adversarial example is a sample of input data which has been modified very slightly in a way …

Adversarial feature selection against evasion attacks

F Zhang, PPK Chan, B Biggio… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Pattern recognition and machine learning techniques have been increasingly adopted in
adversarial settings such as spam, intrusion, and malware detection, although their security …

[HTML][HTML] Improving Adversarial Robustness of Ensemble Classifiers by Diversified Feature Selection and Stochastic Aggregation

F Zhang, K Li, Z Ren - Mathematics, 2024 - mdpi.com
Learning-based classifiers are found to be vulnerable to attacks by adversarial samples.
Some works suggested that ensemble classifiers tend to be more robust than single …

Support vector machines under adversarial label noise

B Biggio, B Nelson, P Laskov - Asian conference on …, 2011 - proceedings.mlr.press
In adversarial classification tasks like spam filtering and intrusion detection, malicious
adversaries may manipulate data to thwart the outcome of an automatic analysis. Thus …

[HTML][HTML] Adversarial classification: An adversarial risk analysis approach

R Naveiro, A Redondo, DR Insua, F Ruggeri - International Journal of …, 2019 - Elsevier
Classification techniques are widely used in security settings in which data can be
deliberately manipulated by an adversary trying to evade detection and achieve some …