Wild patterns: Ten years after the rise of adversarial machine learning
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …
applications, ranging from computer vision to computer security. In most of these …
Decision-based adversarial attacks: Reliable attacks against black-box machine learning models
Many machine learning algorithms are vulnerable to almost imperceptible perturbations of
their inputs. So far it was unclear how much risk adversarial perturbations carry for the safety …
their inputs. So far it was unclear how much risk adversarial perturbations carry for the safety …
Stealing machine learning models via prediction {APIs}
Machine learning (ML) models may be deemed confidential due to their sensitive training
data, commercial value, or use in security applications. Increasingly often, confidential ML …
data, commercial value, or use in security applications. Increasingly often, confidential ML …
Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey
Machine Learning (ML) and Internet of Things (IoT) are complementary advances: ML
techniques unlock the potential of IoT with intelligence, and IoT applications increasingly …
techniques unlock the potential of IoT with intelligence, and IoT applications increasingly …
Evasion attacks against machine learning at test time
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
PRADA: protecting against DNN model stealing attacks
Machine learning (ML) applications are increasingly prevalent. Protecting the confidentiality
of ML models becomes paramount for two reasons:(a) a model can be a business …
of ML models becomes paramount for two reasons:(a) a model can be a business …
Sok: Security and privacy in machine learning
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
Prior convictions: Black-box adversarial attacks with bandits and priors
We study the problem of generating adversarial examples in a black-box setting in which
only loss-oracle access to a model is available. We introduce a framework that conceptually …
only loss-oracle access to a model is available. We introduce a framework that conceptually …
Towards the science of security and privacy in machine learning
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective
In this article, we review previous work on biometric security under a recent framework
proposed in the field of adversarial machine learning. This allows us to highlight novel …
proposed in the field of adversarial machine learning. This allows us to highlight novel …