Results 11 to 20 of about 160,235 (299)
Quantum adversarial machine learning [PDF]
Adversarial machine learning is an emerging field that focuses on studying vulnerabilities of machine learning approaches in adversarial settings and developing techniques accordingly to make learning robust to adversarial manipulations. It plays a vital
Sirui Lu, Lu-Ming Duan, Dong-Ling Deng
doaj +4 more sources
Adversarial machine learning phases of matter
We study the robustness of machine learning approaches to adversarial perturbations, with a focus on supervised learning scenarios. We find that typical phase classifiers based on deep neural networks are extremely vulnerable to adversarial perturbations:
Si Jiang, Sirui Lu, Dong-Ling Deng
doaj +3 more sources
Adversarial Machine Learning [PDF]
Recent innovations in machine learning enjoy a remarkable rate of adoption across a broad spectrum of applications, including cyber-security. While previous chapters study the application of machine learning solutions to cyber-security, in this chapter we present adversarial machine learning: a field of study concerned with the security of machine ...
Hernández-Castro, C.J. +4 more
+5 more sources
On the Economics of Adversarial Machine Learning [PDF]
Florian Merkle +3 more
openalex +2 more sources
Adversarial Machine Learning - Industry Perspectives [PDF]
Minor Typos corrected 7 pages, 1 ...
Ram Shankar Siva Kumar +7 more
openalex +4 more sources
Politics of Adversarial Machine Learning [PDF]
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights.
Kendra Albert +3 more
openaire +2 more sources
A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity
Machine learning algorithms are widely utilized in cybersecurity. However, recent studies show that machine learning algorithms are vulnerable to adversarial examples.
Sicong Zhang, Xiaoyao Xie, Yang Xu
doaj +1 more source
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
Adversarial attacks have threatened the credibility of machine learning models and cast doubts over the integrity of data. The attacks have created much harm in the fields of computer vision, and natural language processing.
Zhipeng Liu +5 more
doaj +1 more source
Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review
In recent years, various domains have been influenced by the rapid growth of machine learning. Autonomous driving is an area that has tremendously developed in parallel with the advancement of machine learning.
Mahima K. T. Y. +2 more
doaj +1 more source
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT
The complexity of the Industrial Internet of Things (IIoT) presents higher requirements for intrusion detection systems (IDSs). An adversarial attack is a threat to the security of machine learning-based IDSs.
Shiming Li +4 more
doaj +1 more source

