A taxonomy and survey of attacks against machine learning
The majority of machine learning methodologies operate with the assumption that their
environment is benign. However, this assumption does not always hold, as it is often …
environment is benign. However, this assumption does not always hold, as it is often …
Optimization problems for machine learning: A survey
This paper surveys the machine learning literature and presents in an optimization
framework several commonly used machine learning approaches. Particularly …
framework several commonly used machine learning approaches. Particularly …
Certified defenses for data poisoning attacks
J Steinhardt, PWW Koh… - Advances in neural …, 2017 - proceedings.neurips.cc
Abstract Machine learning systems trained on user-provided data are susceptible to data
poisoning attacks, whereby malicious users inject false training data with the aim of …
poisoning attacks, whereby malicious users inject false training data with the aim of …
On the (statistical) detection of adversarial examples
Machine Learning (ML) models are applied in a variety of tasks such as network intrusion
detection or Malware classification. Yet, these models are vulnerable to a class of malicious …
detection or Malware classification. Yet, these models are vulnerable to a class of malicious …
Fairness is not static: deeper understanding of long term fairness via simulation studies
As machine learning becomes increasingly incorporated within high impact decision
ecosystems, there is a growing need to understand the long-term behaviors of deployed ML …
ecosystems, there is a growing need to understand the long-term behaviors of deployed ML …
A survey on security threats and defensive techniques of machine learning: A data driven view
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …
been widely applied in image processing, natural language processing, pattern recognition …
Sok: Security and privacy in machine learning
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
Towards the science of security and privacy in machine learning
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
applications such as data analytics, autonomous systems, and security diagnostics. ML is …
When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks
Recent results suggest that attacks against supervised machine learning systems are quite
effective, while defenses are easily bypassed by new attacks. However, the specifications for …
effective, while defenses are easily bypassed by new attacks. However, the specifications for …
Evasion attacks against machine learning at test time
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …