A comprehensive survey on poisoning attacks and countermeasures in machine learning

Z Tian, L Cui, J Liang, S Yu - ACM Computing Surveys, 2022 - dl.acm.org
The prosperity of machine learning has been accompanied by increasing attacks on the
training process. Among them, poisoning attacks have become an emerging threat during …

When machine learning meets privacy in 6G: A survey

Y Sun, J Liu, J Wang, Y Cao… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …

Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

Certified defenses for data poisoning attacks

J Steinhardt, PWW Koh… - Advances in neural …, 2017 - proceedings.neurips.cc
Abstract Machine learning systems trained on user-provided data are susceptible to data
poisoning attacks, whereby malicious users inject false training data with the aim of …

Towards poisoning of deep learning algorithms with back-gradient optimization

L Muñoz-González, B Biggio, A Demontis… - Proceedings of the 10th …, 2017 - dl.acm.org
A number of online services nowadays rely upon machine learning to extract valuable
information from data collected in the wild. This exposes learning algorithms to the threat of …

A survey on security threats and defensive techniques of machine learning: A data driven view

Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung - IEEE access, 2018 - ieeexplore.ieee.org
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …

Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

Support vector machines under adversarial label contamination

H Xiao, B Biggio, B Nelson, H Xiao, C Eckert, F Roli - Neurocomputing, 2015 - Elsevier
Abstract Machine learning algorithms are increasingly being applied in security-related
tasks such as spam and malware detection, although their security properties against …

A survey of machine learning techniques in adversarial image forensics

E Nowroozi, A Dehghantanha, RM Parizi… - Computers & Security, 2021 - Elsevier
Image forensic plays a crucial role in both criminal investigations (eg, dissemination of fake
images to spread racial hate or false narratives about specific ethnicity groups or political …

Adversarial feature selection against evasion attacks

F Zhang, PPK Chan, B Biggio… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Pattern recognition and machine learning techniques have been increasingly adopted in
adversarial settings such as spam, intrusion, and malware detection, although their security …