Results 241 to 250 of about 1,173,800 (295)
Some of the next articles are maybe not open access.
A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure
IEEE Internet of Things Journal, 2023The smart grid advanced metering infrastructure (AMI) is vulnerable to electricity theft cyber-attacks in which malicious smart meters report low readings to reduce the consumers’ bills.
Mahmoud M. Badr +5 more
semanticscholar +1 more source
Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks
International Conference on Information and Knowledge Management, 2021Graph Neural Networks (GNNs) have emerged as a series of effective learning methods for graph-related tasks. However, GNNs are shown vulnerable to adversarial attacks, where attackers can fool GNNs into making wrong predictions on adversarial samples ...
He Zhang +6 more
semanticscholar +1 more source
2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW), 2021
Evasion Attacks have been commonly seen as a weakness of Deep Neural Networks. In this paper, we flip the paradigm and envision this vulnerability as a useful application.
Salah Ghamizi +3 more
semanticscholar +1 more source
Evasion Attacks have been commonly seen as a weakness of Deep Neural Networks. In this paper, we flip the paradigm and envision this vulnerability as a useful application.
Salah Ghamizi +3 more
semanticscholar +1 more source
Distribution-based Adversarial Filter Feature Selection against Evasion Attack
IEEE International Joint Conference on Neural Network, 2021Feature selection plays an important role in machine learning in order to reduce model complexity and extract more meaningful information. The recent studies indicate that not only the generalization ability but also the security should be considered in ...
P. Chan +3 more
semanticscholar +1 more source
Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
Annual Conference on Information Sciences and Systems, 2020Intrusion Detection Systems (IDS) have a long history as an effective network defensive mechanism. The systems alert defenders of suspicious and / or malicious behavior detected on the network.
Md. Ahsan Ayub +3 more
semanticscholar +1 more source
Learning a Secure Classifier against Evasion Attack
2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), 2016In security sensitive applications, there is a crafty adversary component which intends to mislead the detection system. The presence of an adversary component conflicts with the stationary data assumption that is a common assumption in most machine learning methods.
Z. Khorshidpour, S. Hashemi, A. Hamzeh
semanticscholar +2 more sources
Adversarial mRMR against Evasion Attacks
2018 International Joint Conference on Neural Networks (IJCNN), 2018Machine learning (ML) algorithms provide a good solution for many security sensitive applications, they themselves, however, face the threats of adversary attacks. As a key problem in machine learning, how to design robust feature selection algorithms against these attacks becomes a hot issue.
Miaomiao Wu, Yun Li
openaire +1 more source
Evasion Attack of Multi-class Linear Classifiers
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2012Machine learning has yield significant advances in decision-making for complex systems, but are they robust against adversarial attacks? We generalize the evasion attack problem to the multi-class linear classifiers, and present an efficient algorithm for approximating the optimal disguised instance.
Han Xiao, T. Stibor, C. Eckert
semanticscholar +2 more sources
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System
IEEE Transactions on Information Forensics and Security, 2020Deep neural networks (DNNs) are widely used for image recognition, speech recognition, and other pattern analysis tasks. Despite the success of DNNs, these systems can be exploited by what is termed adversarial examples.
Hyun Kwon, Hyun Kwon, H. Yoon, D. Choi
semanticscholar +1 more source

