Adversarial examples on object recognition: A comprehensive survey

A Serban, E Poll, J Visser - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Deep neural networks are at the forefront of machine learning research. However, despite
achieving impressive performance on complex tasks, they can be very sensitive: Small …

Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems

J Liu, M Nogueira, J Fernandes… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Machine Learning (ML) models are susceptible to adversarial samples that appear as
normal samples but have some imperceptible noise added to them with the intention of …

Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

Evasion attacks against machine learning at test time

B Biggio, I Corona, D Maiorca, B Nelson… - Machine Learning and …, 2013 - Springer
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …

Yes, machine learning can be more secure! a case study on android malware detection

A Demontis, M Melis, B Biggio… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
To cope with the increasing variability and sophistication of modern attacks, machine
learning has been widely adopted as a statistically-sound tool for malware detection …

Security evaluation of pattern classifiers under attack

B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …

Machine learning security: Threats, countermeasures, and evaluations

M Xue, C Yuan, H Wu, Y Zhang, W Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Machine learning has been pervasively used in a wide range of applications due to its
technical breakthroughs in recent years. It has demonstrated significant success in dealing …

Support vector machines under adversarial label noise

B Biggio, B Nelson, P Laskov - Asian conference on …, 2011 - proceedings.mlr.press
In adversarial classification tasks like spam filtering and intrusion detection, malicious
adversaries may manipulate data to thwart the outcome of an automatic analysis. Thus …

Are we ready for learned cardinality estimation?

X Wang, C Qu, W Wu, J Wang, Q Zhou - arxiv preprint arxiv:2012.06743, 2020 - arxiv.org
Cardinality estimation is a fundamental but long unresolved problem in query optimization.
Recently, multiple papers from different research groups consistently report that learned …

Detecting adversarial image examples in deep neural networks with adaptive noise reduction

B Liang, H Li, M Su, X Li, W Shi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Recently, many studies have demonstrated deep neural network (DNN) classifiers can be
fooled by the adversarial example, which is crafted via introducing some perturbations into …