Results 1 to 10 of about 160,086 (168)

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning [PDF]

open access: yesPattern Recognition, 2018
Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity.
Biggio, Battista, Roli, Fabio
core   +4 more sources

Attack and Defense in Cellular Decision-Making: Lessons from Machine Learning

open access: yesPhysical Review X, 2019
Machine-learning algorithms can be fooled by small well-designed adversarial perturbations. This is reminiscent of cellular decision-making where ligands (called antagonists) prevent correct signaling, like in early immune recognition.
Thomas J. Rademaker   +2 more
doaj   +2 more sources

Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense

open access: yesFuture Internet, 2023
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks ...
Afnan Alotaibi, Murad A. Rassam
doaj   +3 more sources

Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey

open access: yesJournal of Cybersecurity and Privacy, 2022
Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection.
Andrew McCarthy   +3 more
doaj   +3 more sources

Adversarial Machine Learning in Text Processing: A Literature Survey

open access: yesIEEE Access, 2022
Machine learning algorithms represent the intelligence that controls many information systems and applications around us. As such, they are targeted by attackers to impact their decisions.
Izzat Alsmadi   +11 more
doaj   +3 more sources

STS-AT: A Structured Tensor Flow Adversarial Training Framework for Robust Intrusion Detection [PDF]

open access: yesSensors
Network intrusion detection is a key technology for ensuring cybersecurity. However, current methods face two major challenges: reliance on manual feature engineering, which leads to the loss of discriminative information, and the vulnerability of deep ...
Juntong Zhu   +4 more
doaj   +2 more sources

Adversarial attacks against supervised machine learning based network intrusion detection systems.

open access: yesPLoS ONE, 2022
Adversarial machine learning is a recent area of study that explores both adversarial attack strategy and detection systems of adversarial attacks, which are inputs specially crafted to outwit the classification of detection systems or disrupt the ...
Ebtihaj Alshahrani   +3 more
doaj   +2 more sources

Adversarial attacks on deep learning models in smart grids

open access: yesEnergy Reports, 2022
A smart grid may employ various machine learning models for intelligent tasks, such as load forecasting, fault diagnosis and demand response. However, the research on adversarial machine learning has attracted broad interest recently with the rapid ...
Jingbo Hao, Yang Tao
doaj   +1 more source

Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach

open access: yesSensors, 2023
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter   +4 more
doaj   +1 more source

Adversarial Machine Learning on Social Network: A Survey

open access: yesFrontiers in Physics, 2021
In recent years, machine learning technology has made great improvements in social networks applications such as social network recommendation systems, sentiment analysis, and text generation.
Sensen Guo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy