Results 21 to 30 of about 156,834 (158)

Research on filter-based adversarial feature selection against evasion attacks

open access: yesDianxin kexue, 2023
With the rapid development and widespread application of machine learning technology, its security has attracted increasing attention, leading to a growing interest in adversarial machine learning.In adversarial scenarios, machine learning techniques are
Qimeng HUANG, Miaomiao WU, Yun LI
doaj   +2 more sources

A Robust Network Intrusion Detection System Using Random Forest Based Random Subspace Ensemble to Defend Against Adversarial Attacks

open access: yesAdvances in Electrical and Computer Engineering, 2023
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques.
NATHANIEL, D., SOOSAI, A.
doaj   +1 more source

AdVersarial [PDF]

open access: yesProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Perceptual ad-blocking is a novel approach that detects online advertisements based on their visual content. Compared to traditional filter lists, the use of perceptual signals is believed to be less prone to an arms race with web publishers and ad networks. We demonstrate that this may not be the case.
Tramèr, Florian   +4 more
openaire   +2 more sources

Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network

open access: yesSensors, 2023
Intrusion detection and prevention are two of the most important issues to solve in network security infrastructure. Intrusion detection systems (IDSs) protect networks by using patterns to detect malicious traffic. As attackers have tried to dissimulate
Andrei-Grigore Mari   +2 more
doaj   +1 more source

Machine learning uncertainties with adversarial neural networks [PDF]

open access: yesThe European Physical Journal C, 2019
10 pages, 6 figures, v2: published ...
Englert, Christoph   +3 more
openaire   +7 more sources

A Distributed Biased Boundary Attack Method in Black-Box Attack

open access: yesApplied Sciences, 2021
The adversarial samples threaten the effectiveness of machine learning (ML) models and algorithms in many applications. In particular, black-box attack methods are quite close to actual scenarios.
Fengtao Xiang   +3 more
doaj   +1 more source

Adversarial Machine Learning: Bayesian Perspectives

open access: yesJournal of the American Statistical Association, 2023
Adversarial Machine Learning (AML) is emerging as a major field aimed at protecting machine learning (ML) systems against security threats: in certain scenarios there may be adversaries that actively manipulate input data to fool learning systems.
Rios Insua, David   +3 more
openaire   +3 more sources

Politics of Adversarial Machine Learning [PDF]

open access: yesSSRN Electronic Journal, 2020
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights.
Albert, Kendra   +3 more
openaire   +2 more sources

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +1 more source

eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics

open access: yesIEEE Access, 2022
Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and
Ivan Vaccari   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy