Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …
operating systems and various file formats. To defend against ever-increasing and ever …
Defense strategies for adversarial machine learning: A survey
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
Unsolved problems in ml safety
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …
Trustworthy ai: A computational perspective
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …
developments, changing everyone's daily life and profoundly altering the course of human …
Privacy and security issues in deep learning: A survey
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …
remarkable success and are being extensively applied in a variety of application domains …
Machine learning security: Threats, countermeasures, and evaluations
Machine learning has been pervasively used in a wide range of applications due to its
technical breakthroughs in recent years. It has demonstrated significant success in dealing …
technical breakthroughs in recent years. It has demonstrated significant success in dealing …
Deepfake text detection: Limitations and opportunities
J Pu, Z Sarwar, SM Abdullah, A Rehman… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Recent advances in generative models for language have enabled the creation of
convincing synthetic text or deepfake text. Prior work has demonstrated the potential for …
convincing synthetic text or deepfake text. Prior work has demonstrated the potential for …
Geoda: a geometric framework for black-box adversarial attacks
A Rahmati, SM Moosavi-Dezfooli… - Proceedings of the …, 2020 - openaccess.thecvf.com
Adversarial examples are known as carefully perturbed images fooling image classifiers. We
propose a geometric framework to generate adversarial examples in one of the most …
propose a geometric framework to generate adversarial examples in one of the most …
Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms
C Zhang, X Costa-Perez… - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Neural networks (NNs) are increasingly popular in developing NIDS, yet can prove
vulnerable to adversarial examples. Through these, attackers that may be oblivious to the …
vulnerable to adversarial examples. Through these, attackers that may be oblivious to the …
Privacy side channels in machine learning systems
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum, when in reality, ML models are part of larger systems that include …
models exist in a vacuum, when in reality, ML models are part of larger systems that include …