A comprehensive survey on poisoning attacks and countermeasures in machine learning
The prosperity of machine learning has been accompanied by increasing attacks on the
training process. Among them, poisoning attacks have become an emerging threat during …
training process. Among them, poisoning attacks have become an emerging threat during …
When machine learning meets privacy in 6G: A survey
The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …
Wild patterns: Ten years after the rise of adversarial machine learning
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …
applications, ranging from computer vision to computer security. In most of these …
Certified defenses for data poisoning attacks
J Steinhardt, PWW Koh… - Advances in neural …, 2017 - proceedings.neurips.cc
Abstract Machine learning systems trained on user-provided data are susceptible to data
poisoning attacks, whereby malicious users inject false training data with the aim of …
poisoning attacks, whereby malicious users inject false training data with the aim of …
Towards poisoning of deep learning algorithms with back-gradient optimization
A number of online services nowadays rely upon machine learning to extract valuable
information from data collected in the wild. This exposes learning algorithms to the threat of …
information from data collected in the wild. This exposes learning algorithms to the threat of …
A survey on security threats and defensive techniques of machine learning: A data driven view
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …
been widely applied in image processing, natural language processing, pattern recognition …
Machine learning in cybersecurity: a comprehensive survey
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …
Support vector machines under adversarial label contamination
Abstract Machine learning algorithms are increasingly being applied in security-related
tasks such as spam and malware detection, although their security properties against …
tasks such as spam and malware detection, although their security properties against …
A survey of machine learning techniques in adversarial image forensics
Image forensic plays a crucial role in both criminal investigations (eg, dissemination of fake
images to spread racial hate or false narratives about specific ethnicity groups or political …
images to spread racial hate or false narratives about specific ethnicity groups or political …
Adversarial feature selection against evasion attacks
Pattern recognition and machine learning techniques have been increasingly adopted in
adversarial settings such as spam, intrusion, and malware detection, although their security …
adversarial settings such as spam, intrusion, and malware detection, although their security …