Abstract. Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However in some adversarial settings, the test set can be deliberately constructed in order to increase the error rates of a classifier. A prominent example is email spam where words are transformed to avoid word-based features embedded in a spam filter. Recent research has modeled interactions be-tween a data miner and an adversary as a sequential Stackelberg game, and solved its Nash equilibrium to build classifiers that are more robust to subsequent manipulations on training data sets. However in this pa-per we argue that the iterative algorithm used in the Stackelberg game, which solves an optimization pro...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Spam has been studied and dealt with extensively in the email, web and, recently, the blog domain. R...
Abstract. Traditional classification methods assume that the training and the test data arise from t...
Abstract—It is now widely accepted that in many situa-tions where classifiers are deployed, adversar...
Many data mining applications, ranging from Spam filtering to intrusion detection, are forced with a...
a game theoretic approach for the adversarial learning problem. The main aspects of the approach wou...
International audienceWe consider the problem of finding optimal classifiers in an adversarial setti...
© 1989-2012 IEEE. We develop an adversarial learning algorithm for supervised classification in gene...
The standard assumption of identically distributed training and test data is violated when the test ...
© 2018 IEEE. Adversarial learning is the study of machine learning techniques deployed in non-benign...
This paper tackles the problem of adversarial examples from a game theoretic point of view. We study...
We consider a repeated sequential game between a learner, who plays first, and an opponent who respo...
© 2017 IEEE. Deep learning has been found to be vulnerable to changes in the data distribution. This...
Standard machine learning algorithms typically assume that data is sampled independently from the di...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Spam has been studied and dealt with extensively in the email, web and, recently, the blog domain. R...
Abstract. Traditional classification methods assume that the training and the test data arise from t...
Abstract—It is now widely accepted that in many situa-tions where classifiers are deployed, adversar...
Many data mining applications, ranging from Spam filtering to intrusion detection, are forced with a...
a game theoretic approach for the adversarial learning problem. The main aspects of the approach wou...
International audienceWe consider the problem of finding optimal classifiers in an adversarial setti...
© 1989-2012 IEEE. We develop an adversarial learning algorithm for supervised classification in gene...
The standard assumption of identically distributed training and test data is violated when the test ...
© 2018 IEEE. Adversarial learning is the study of machine learning techniques deployed in non-benign...
This paper tackles the problem of adversarial examples from a game theoretic point of view. We study...
We consider a repeated sequential game between a learner, who plays first, and an opponent who respo...
© 2017 IEEE. Deep learning has been found to be vulnerable to changes in the data distribution. This...
Standard machine learning algorithms typically assume that data is sampled independently from the di...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Spam has been studied and dealt with extensively in the email, web and, recently, the blog domain. R...