Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

Unsolved problems in ml safety

D Hendrycks, N Carlini, J Schulman… - arXiv preprint arXiv …, 2021 - arxiv.org
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …

Trustworthy ai: A computational perspective

H Liu, Y Wang, W Fan, X Liu, Y Li, S Jain, Y Liu… - ACM Transactions on …, 2022 - dl.acm.org
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …

Privacy and security issues in deep learning: A survey

X Liu, L Xie, Y Wang, J Zou, J Xiong, Z Ying… - IEEE …, 2020 - ieeexplore.ieee.org
Deep Learning (DL) algorithms based on artificial neural networks have achieved
remarkable success and are being extensively applied in a variety of application domains …

Machine learning security: Threats, countermeasures, and evaluations

M Xue, C Yuan, H Wu, Y Zhang, W Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Machine learning has been pervasively used in a wide range of applications due to its
technical breakthroughs in recent years. It has demonstrated significant success in dealing …

Deepfake text detection: Limitations and opportunities

J Pu, Z Sarwar, SM Abdullah, A Rehman… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Recent advances in generative models for language have enabled the creation of
convincing synthetic text or deepfake text. Prior work has demonstrated the potential for …

Geoda: a geometric framework for black-box adversarial attacks

A Rahmati, SM Moosavi-Dezfooli… - Proceedings of the …, 2020 - openaccess.thecvf.com
Adversarial examples are known as carefully perturbed images fooling image classifiers. We
propose a geometric framework to generate adversarial examples in one of the most …

Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms

C Zhang, X Costa-Perez… - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Neural networks (NNs) are increasingly popular in developing NIDS, yet can prove
vulnerable to adversarial examples. Through these, attackers that may be oblivious to the …

Privacy side channels in machine learning systems

E Debenedetti, G Severi, N Carlini… - arXiv preprint arXiv …, 2023 - arxiv.org
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum, when in reality, ML models are part of larger systems that include …