A taxonomy and survey of attacks against machine learning

N Pitropakis, E Panaousis, T Giannetsos… - Computer Science …, 2019 - Elsevier
The majority of machine learning methodologies operate with the assumption that their
environment is benign. However, this assumption does not always hold, as it is often …

Optimization problems for machine learning: A survey

C Gambella, B Ghaddar, J Naoum-Sawaya - European Journal of …, 2021 - Elsevier
This paper surveys the machine learning literature and presents in an optimization
framework several commonly used machine learning approaches. Particularly …

Certified defenses for data poisoning attacks

J Steinhardt, PWW Koh… - Advances in neural …, 2017 - proceedings.neurips.cc
Abstract Machine learning systems trained on user-provided data are susceptible to data
poisoning attacks, whereby malicious users inject false training data with the aim of …

On the (statistical) detection of adversarial examples

K Grosse, P Manoharan, N Papernot, M Backes… - arXiv preprint arXiv …, 2017 - arxiv.org
Machine Learning (ML) models are applied in a variety of tasks such as network intrusion
detection or Malware classification. Yet, these models are vulnerable to a class of malicious …

Fairness is not static: deeper understanding of long term fairness via simulation studies

A D'Amour, H Srinivasan, J Atwood, P Baljekar… - Proceedings of the …, 2020 - dl.acm.org
As machine learning becomes increasingly incorporated within high impact decision
ecosystems, there is a growing need to understand the long-term behaviors of deployed ML …

A survey on security threats and defensive techniques of machine learning: A data driven view

Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung - IEEE access, 2018 - ieeexplore.ieee.org
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …

Sok: Security and privacy in machine learning

N Papernot, P McDaniel, A Sinha… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …

Towards the science of security and privacy in machine learning

N Papernot, P McDaniel, A Sinha… - arXiv preprint arXiv …, 2016 - arxiv.org
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …

When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks

O Suciu, R Marginean, Y Kaya, H Daume III… - 27th USENIX Security …, 2018 - usenix.org
Recent results suggest that attacks against supervised machine learning systems are quite
effective, while defenses are easily bypassed by new attacks. However, the specifications for …

Evasion attacks against machine learning at test time

B Biggio, I Corona, D Maiorca, B Nelson… - Machine Learning and …, 2013 - Springer
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …