In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic ma...
Computer vision applications such as image classification and object detection often suffer from adv...
Computer vision applications such as image classification and object detection often suffer from adv...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In many security applications a pattern recognition system faces an adversarial classification probl...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
Abstract—It is now widely accepted that in many situa-tions where classifiers are deployed, adversar...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Machine learning is widely used in security-sensitive settings like spam and malware detection, alth...
Many data mining applications, ranging from Spam filtering to intrusion detection, are forced with a...
© 2018 IEEE. Adversarial learning is the study of machine learning techniques deployed in non-benign...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
The vulnerability of deep neural network models to adversarial example attacks is a practical challe...
It has been recently shown that it is possible to cheat many machine learning algorithms -- i.e., ...
Computer vision applications such as image classification and object detection often suffer from adv...
Computer vision applications such as image classification and object detection often suffer from adv...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In many security applications a pattern recognition system faces an adversarial classification probl...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
Abstract—It is now widely accepted that in many situa-tions where classifiers are deployed, adversar...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Machine learning is widely used in security-sensitive settings like spam and malware detection, alth...
Many data mining applications, ranging from Spam filtering to intrusion detection, are forced with a...
© 2018 IEEE. Adversarial learning is the study of machine learning techniques deployed in non-benign...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
The vulnerability of deep neural network models to adversarial example attacks is a practical challe...
It has been recently shown that it is possible to cheat many machine learning algorithms -- i.e., ...
Computer vision applications such as image classification and object detection often suffer from adv...
Computer vision applications such as image classification and object detection often suffer from adv...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...