Adversarial examples on object recognition: A comprehensive survey
Deep neural networks are at the forefront of machine learning research. However, despite
achieving impressive performance on complex tasks, they can be very sensitive: Small …
achieving impressive performance on complex tasks, they can be very sensitive: Small …
Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems
Machine Learning (ML) models are susceptible to adversarial samples that appear as
normal samples but have some imperceptible noise added to them with the intention of …
normal samples but have some imperceptible noise added to them with the intention of …
Wild patterns: Ten years after the rise of adversarial machine learning
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …
applications, ranging from computer vision to computer security. In most of these …
Evasion attacks against machine learning at test time
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
Yes, machine learning can be more secure! a case study on android malware detection
To cope with the increasing variability and sophistication of modern attacks, machine
learning has been widely adopted as a statistically-sound tool for malware detection …
learning has been widely adopted as a statistically-sound tool for malware detection …
Security evaluation of pattern classifiers under attack
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …
authentication, network intrusion detection, and spam filtering, in which data can be …
Machine learning security: Threats, countermeasures, and evaluations
Machine learning has been pervasively used in a wide range of applications due to its
technical breakthroughs in recent years. It has demonstrated significant success in dealing …
technical breakthroughs in recent years. It has demonstrated significant success in dealing …
Support vector machines under adversarial label noise
In adversarial classification tasks like spam filtering and intrusion detection, malicious
adversaries may manipulate data to thwart the outcome of an automatic analysis. Thus …
adversaries may manipulate data to thwart the outcome of an automatic analysis. Thus …
Are we ready for learned cardinality estimation?
Cardinality estimation is a fundamental but long unresolved problem in query optimization.
Recently, multiple papers from different research groups consistently report that learned …
Recently, multiple papers from different research groups consistently report that learned …
Detecting adversarial image examples in deep neural networks with adaptive noise reduction
Recently, many studies have demonstrated deep neural network (DNN) classifiers can be
fooled by the adversarial example, which is crafted via introducing some perturbations into …
fooled by the adversarial example, which is crafted via introducing some perturbations into …