Transductive robust learning guarantees
O Montasser, S Hanneke… - … Conference on Artificial …, 2022 - proceedings.mlr.press
We study the problem of adversarially robust learning in the transductive setting. For classes
H of bounded VC dimension, we propose a simple transductive learner that when presented …
H of bounded VC dimension, we propose a simple transductive learner that when presented …
Defense against adversarial malware using robust classifier: DAM-ROC
SG Selvaganapathy, S Sadasivam - Sādhanā, 2022 - Springer
Malware authors focus on deceiving and evading Anti Malware Engines (AME). Evasion
attacks take in malware samples and modify those samples to by-pass ml based AME …
attacks take in malware samples and modify those samples to by-pass ml based AME …
The Good, the Bad and the Ugly: Watermarks, Transferable Attacks and Adversarial Defenses
We formalize and extend existing definitions of backdoor-based watermarks and adversarial
defenses as interactive protocols between two players. The existence of these schemes is …
defenses as interactive protocols between two players. The existence of these schemes is …
[HTML][HTML] Multi-Stage Dual-Perturbation Attack Targeting Transductive SVMs and the Corresponding Adversarial Training Defense Mechanism
The Transductive Support Vector Machine (TSVM) is an effective semi-supervised learning
algorithm vulnerable to adversarial sample attacks. This paper proposes a new adversarial …
algorithm vulnerable to adversarial sample attacks. This paper proposes a new adversarial …
Computational asymmetries in robust classification
S Marro, M Lombardi - International Conference on Machine …, 2023 - proceedings.mlr.press
In the context of adversarial robustness, we make three strongly related contributions. First,
we prove that while attacking ReLU classifiers is $\mathit {NP} $-hard, ensuring their …
we prove that while attacking ReLU classifiers is $\mathit {NP} $-hard, ensuring their …
Defending evasion attacks via adversarially adaptive training
Adversarial machine learning has been extensively studied from perspectives of attack
settings and defense strategies. However, existing adversarial training models fail to be …
settings and defense strategies. However, existing adversarial training models fail to be …
Best of Both Worlds: Towards Adversarial Robustness with Transduction and Rejection
Both transduction and rejection have emerged as key techniques to enable stronger
defenses against adversarial perturbations, but existing work has not investigated the …
defenses against adversarial perturbations, but existing work has not investigated the …