B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be …
B Biggio, G Fumera, F Roli - … and Statistical Pattern Recognition: Joint IAPR …, 2008 - Springer
In many security applications a pattern recognition system faces an adversarial classification problem, in which an intelligent, adaptive adversary modifies patterns to evade the classifier …
B Biggio, G Fumera, F Roli - … , MCS 2009, Reykjavik, Iceland, June 10-12 …, 2009 - Springer
Pattern classification systems are currently used in security applications like intrusion detection in computer networks, spam filtering and biometric identity recognition. These are …
Pattern recognition systems have been widely used in adversarial classification tasks like spam filtering and intrusion detection in computer networks. In these applications a …
Most existing machine learning classifiers are highly vulnerable to adversarial examples. An adversarial example is a sample of input data which has been modified very slightly in a way …
F Zhang, PPK Chan, B Biggio… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security …
F Zhang, K Li, Z Ren - Mathematics, 2024 - mdpi.com
Learning-based classifiers are found to be vulnerable to attacks by adversarial samples. Some works suggested that ensemble classifiers tend to be more robust than single …
B Biggio, B Nelson, P Laskov - Asian conference on …, 2011 - proceedings.mlr.press
In adversarial classification tasks like spam filtering and intrusion detection, malicious adversaries may manipulate data to thwart the outcome of an automatic analysis. Thus …
Classification techniques are widely used in security settings in which data can be deliberately manipulated by an adversary trying to evade detection and achieve some …