Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

Decision-based adversarial attacks: Reliable attacks against black-box machine learning models

W Brendel, J Rauber, M Bethge - arxiv preprint arxiv:1712.04248, 2017 - arxiv.org
Many machine learning algorithms are vulnerable to almost imperceptible perturbations of
their inputs. So far it was unclear how much risk adversarial perturbations carry for the safety …

Stealing machine learning models via prediction {APIs}

F Tramèr, F Zhang, A Juels, MK Reiter… - 25th USENIX security …, 2016 - usenix.org
Machine learning (ML) models may be deemed confidential due to their sensitive training
data, commercial value, or use in security applications. Increasingly often, confidential ML …

Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey

B Qian, J Su, Z Wen, DN Jha, Y Li, Y Guan… - ACM Computing …, 2020 - dl.acm.org
Machine Learning (ML) and Internet of Things (IoT) are complementary advances: ML
techniques unlock the potential of IoT with intelligence, and IoT applications increasingly …

Evasion attacks against machine learning at test time

B Biggio, I Corona, D Maiorca, B Nelson… - Machine Learning and …, 2013 - Springer
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …

PRADA: protecting against DNN model stealing attacks

M Juuti, S Szyller, S Marchal… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Machine learning (ML) applications are increasingly prevalent. Protecting the confidentiality
of ML models becomes paramount for two reasons:(a) a model can be a business …

Sok: Security and privacy in machine learning

N Papernot, P McDaniel, A Sinha… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …

Prior convictions: Black-box adversarial attacks with bandits and priors

A Ilyas, L Engstrom, A Madry - arxiv preprint arxiv:1807.07978, 2018 - arxiv.org
We study the problem of generating adversarial examples in a black-box setting in which
only loss-oracle access to a model is available. We introduce a framework that conceptually …

Towards the science of security and privacy in machine learning

N Papernot, P McDaniel, A Sinha… - arxiv preprint arxiv …, 2016 - arxiv.org
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …

Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective

B Biggio, P Russu, L Didaci, F Roli - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
In this article, we review previous work on biometric security under a recent framework
proposed in the field of adversarial machine learning. This allows us to highlight novel …