Results 31 to 40 of about 1,143,792 (206)
Research on filter-based adversarial feature selection against evasion attacks
With the rapid development and widespread application of machine learning technology, its security has attracted increasing attention, leading to a growing interest in adversarial machine learning.In adversarial scenarios, machine learning techniques are
Qimeng HUANG, Miaomiao WU, Yun LI
doaj +2 more sources
Adversarial Attacks and Defenses in Deep Learning
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical to ensure the security and robustness of the deployed algorithms.
Kui Ren +3 more
doaj +1 more source
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques.
NATHANIEL, D., SOOSAI, A.
doaj +1 more source
Intrusion detection and prevention are two of the most important issues to solve in network security infrastructure. Intrusion detection systems (IDSs) protect networks by using patterns to detect malicious traffic. As attackers have tried to dissimulate
Andrei-Grigore Mari +2 more
doaj +1 more source
Membership Inference Attacks Against Machine Learning Models [PDF]
We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if ...
R. Shokri +3 more
semanticscholar +1 more source
A Distributed Biased Boundary Attack Method in Black-Box Attack
The adversarial samples threaten the effectiveness of machine learning (ML) models and algorithms in many applications. In particular, black-box attack methods are quite close to actual scenarios.
Fengtao Xiang +3 more
doaj +1 more source
Adversarial machine learning phases of matter
We study the robustness of machine learning approaches to adversarial perturbations, with a focus on supervised learning scenarios. We find that typical phase classifiers based on deep neural networks are extremely vulnerable to adversarial perturbations:
Si Jiang, Sirui Lu, Dong-Ling Deng
doaj +1 more source
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan +4 more
doaj +1 more source
The abstract is "The rapid evolution of cyber threats necessitates innovative defenses, particularly in the domains of risk assessment and fraud detection.
Idoko Peter +7 more
semanticscholar +1 more source
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems [PDF]
Recent research demonstrated that the superficially well-trained machine learning (ML) models are highly vulnerable to adversarial examples. As ML techniques are becoming a popular solution for cyber-physical systems (CPSs) applications in research ...
Jiangnan Li +4 more
semanticscholar +1 more source

