The security of machine learning in an adversarial setting: A survey

X Wang, J Li, X Kuang, Y Tan, J Li - Journal of Parallel and Distributed …, 2019 - Elsevier
Abstract Machine learning (ML) methods have demonstrated impressive performance in
many application fields such as autopilot, facial recognition, and spam detection …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

Adversarial machine learning attacks and defense methods in the cyber security domain

I Rosenberg, A Shabtai, Y Elovici… - ACM Computing Surveys …, 2021 - dl.acm.org
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …

A taxonomy and survey of attacks against machine learning

N Pitropakis, E Panaousis, T Giannetsos… - Computer Science …, 2019 - Elsevier
The majority of machine learning methodologies operate with the assumption that their
environment is benign. However, this assumption does not always hold, as it is often …

Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

Adversarial detection with model interpretation

N Liu, H Yang, X Hu - Proceedings of the 24th ACM SIGKDD …, 2018 - dl.acm.org
Machine learning (ML) systems have been increasingly applied in web security applications
such as spammer detection, malware detection and fraud detection. These applications …

[图书][B] Adversarial machine learning

AD Joseph, B Nelson, BIP Rubinstein, JD Tygar - 2018 - books.google.com
Written by leading researchers, this complete introduction brings together all the theory and
tools needed for building robust machine learning in adversarial environments. Discover …

Secure kernel machines against evasion attacks

P Russu, A Demontis, B Biggio, G Fumera… - Proceedings of the 2016 …, 2016 - dl.acm.org
Machine learning is widely used in security-sensitive settings like spam and malware
detection, although it has been shown that malicious data can be carefully modified at test …

A system-driven taxonomy of attacks and defenses in adversarial machine learning

K Sadeghi, A Banerjee… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in
modern real-world applications, which utilize Computational Intelligence (CI) as their core …

Objective metrics and gradient descent algorithms for adversarial examples in machine learning

U Jang, X Wu, S Jha - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Fueled by massive amounts of data, models produced by machine-learning (ML) algorithms
are being used in diverse domains where security is a concern, such as, automotive …