Results 21 to 30 of about 156,834 (158)
Research on filter-based adversarial feature selection against evasion attacks
With the rapid development and widespread application of machine learning technology, its security has attracted increasing attention, leading to a growing interest in adversarial machine learning.In adversarial scenarios, machine learning techniques are
Qimeng HUANG, Miaomiao WU, Yun LI
doaj +2 more sources
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques.
NATHANIEL, D., SOOSAI, A.
doaj +1 more source
Perceptual ad-blocking is a novel approach that detects online advertisements based on their visual content. Compared to traditional filter lists, the use of perceptual signals is believed to be less prone to an arms race with web publishers and ad networks. We demonstrate that this may not be the case.
Tramèr, Florian +4 more
openaire +2 more sources
Intrusion detection and prevention are two of the most important issues to solve in network security infrastructure. Intrusion detection systems (IDSs) protect networks by using patterns to detect malicious traffic. As attackers have tried to dissimulate
Andrei-Grigore Mari +2 more
doaj +1 more source
Machine learning uncertainties with adversarial neural networks [PDF]
10 pages, 6 figures, v2: published ...
Englert, Christoph +3 more
openaire +7 more sources
A Distributed Biased Boundary Attack Method in Black-Box Attack
The adversarial samples threaten the effectiveness of machine learning (ML) models and algorithms in many applications. In particular, black-box attack methods are quite close to actual scenarios.
Fengtao Xiang +3 more
doaj +1 more source
Adversarial Machine Learning: Bayesian Perspectives
Adversarial Machine Learning (AML) is emerging as a major field aimed at protecting machine learning (ML) systems against security threats: in certain scenarios there may be adversaries that actively manipulate input data to fool learning systems.
Rios Insua, David +3 more
openaire +3 more sources
Politics of Adversarial Machine Learning [PDF]
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights.
Albert, Kendra +3 more
openaire +2 more sources
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan +4 more
doaj +1 more source
eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics
Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and
Ivan Vaccari +4 more
doaj +1 more source

