Results 11 to 20 of about 1,185,392 (332)
Adversarial Machine Learning - Industry Perspectives [PDF]
Based on interviews with 28 organizations, we found that industry practitioners are not equipped with tactical and strategic tools to protect, detect and respond to attacks on their Machine Learning (ML) systems.
Ram Shankar Siva Kumar +7 more
semanticscholar +6 more sources
Adversarial machine learning [PDF]
In this paper (expanded from an invited talk at AISEC 2010), we discuss an emerging field of study: adversarial machine learning---the study of effective machine learning techniques against an adversarial opponent.
Ling Huang +4 more
semanticscholar +3 more sources
This NIST AI report develops a taxonomy of concepts and defines terminology in the field of adversarial machine learning (AML). The taxonomy is built on survey of the AML literature and is arranged in a conceptual hierarchy that includes key types of ML methods and lifecycle stage of attack, attacker goals and objectives, and attacker capabilities and ...
Alina Oprea
semanticscholar +5 more sources
Adversarial machine learning phases of matter
We study the robustness of machine learning approaches to adversarial perturbations, with a focus on supervised learning scenarios. We find that typical phase classifiers based on deep neural networks are extremely vulnerable to adversarial perturbations:
Si Jiang, Sirui Lu, Dong-Ling Deng
doaj +3 more sources
eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics
Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and
Ivan Vaccari +4 more
doaj +2 more sources
Adversarial Machine Learning in Text Processing: A Literature Survey
Machine learning algorithms represent the intelligence that controls many information systems and applications around us. As such, they are targeted by attackers to impact their decisions.
Izzat Alsmadi +11 more
doaj +2 more sources
Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review
Cyber-security is the practice of protecting computing systems and networks from digital attacks, which are a rising concern in the Information Age. With the growing pace at which new attacks are developed, conventional signature based attack detection ...
Nuno Martins +3 more
doaj +2 more sources
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets
Studies have shown the vulnerability of machine learning algorithms against adversarial samples in image classification problems in deep neural networks. However, there is a need for performing comprehensive studies of adversarial machine learning in the
Yulexis Pacheco, Weiqing Sun
openalex +2 more sources
STS-AT: A Structured Tensor Flow Adversarial Training Framework for Robust Intrusion Detection [PDF]
Network intrusion detection is a key technology for ensuring cybersecurity. However, current methods face two major challenges: reliance on manual feature engineering, which leads to the loss of discriminative information, and the vulnerability of deep ...
Juntong Zhu +4 more
doaj +2 more sources
Adversarial Machine Learning in Cybersecurity: Attacks and Defenses
Adversarial Machine Learning (AML) refers to the research field that involves testing and improving machine learning models by introducing adversarial samples or attack techniques.
Ke Hu +4 more
openalex +3 more sources

