Results 11 to 20 of about 156,834 (158)
Adversarial Machine Learning on Social Network: A Survey
In recent years, machine learning technology has made great improvements in social networks applications such as social network recommendation systems, sentiment analysis, and text generation.
Sensen Guo +5 more
doaj +1 more source
Machine learning is being integrated into a growing number of critical systems with far-reaching impacts on society. Unexpected behaviour and unfair decision processes are coming under increasing scrutiny due to this widespread use and its theoretical considerations.
Delobelle, Pieter +5 more
openaire +6 more sources
A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity
Machine learning algorithms are widely utilized in cybersecurity. However, recent studies show that machine learning algorithms are vulnerable to adversarial examples.
Sicong Zhang, Xiaoyao Xie, Yang Xu
doaj +1 more source
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
Adversarial attacks have threatened the credibility of machine learning models and cast doubts over the integrity of data. The attacks have created much harm in the fields of computer vision, and natural language processing.
Zhipeng Liu +5 more
doaj +1 more source
Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review
In recent years, various domains have been influenced by the rapid growth of machine learning. Autonomous driving is an area that has tremendously developed in parallel with the advancement of machine learning.
Mahima K. T. Y. +2 more
doaj +1 more source
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT
The complexity of the Industrial Internet of Things (IIoT) presents higher requirements for intrusion detection systems (IDSs). An adversarial attack is a threat to the security of machine learning-based IDSs.
Shiming Li +4 more
doaj +1 more source
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks ...
Afnan Alotaibi, Murad A. Rassam
doaj +1 more source
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning [PDF]
Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity.
Biggio, Battista, Roli, Fabio
core +2 more sources
Impact of adversarial examples on deep learning models for biomedical image segmentation [PDF]
Deep learning models, which are increasingly being used in the field of medical image analysis, come with a major security risk, namely, their vulnerability to adversarial examples.
C Pena-Betancor +3 more
core +4 more sources
Adversarial Attacks and Defenses in Deep Learning
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical to ensure the security and robustness of the deployed algorithms.
Kui Ren +3 more
doaj +1 more source

