Machine learning models are now widely deployed in real-world applications. However, the existence of adversarial examples has been long considered a real threat to such models. While numerous defenses aiming to improve the robustness have been proposed, many have been shown ineffective. As these vulnerabilities are still nowhere near being eliminated, we propose an alternative deployment-based defense paradigm that goes beyond the traditional white-box and black-box threat models. Instead of training and deploying a single partially-robust model, one could train a set of same-functionality, yet, adversarially-disjoint models with minimal in-between attack transferability. These models could then be randomly and individually deployed, such ...
Despite the success of convolutional neural networks (CNNs) in many academic benchmarks for computer...
Recent development of adversarial attacks has proven that ensemble-based methods outperform traditio...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...
Adversarial machine learning has been an important area of study for the securing of machine learnin...
Machine Learning (ML) models are vulnerable to adversarial samples — human imperceptible changes to ...
Neural networks recently have been used to solve many real-world tasks such as image recognition and...
Machine learning is used in myriad aspects, both in academic research and in everyday life, includin...
From simple time series forecasting to computer security and autonomous systems, machine learning (M...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
peer reviewedAn established way to improve the transferability of black-box evasion attacks is to cr...
Machine learning models are vulnerable to evasion attacks, where the attacker starts from a correctl...
Learning-based classifiers are susceptible to adversarial examples. Existing defence methods are mos...
Adversarial Training is proved to be an efficient method to defend against adversarial examples, bei...
Deep learning has improved the performance of many computer vision tasks. However, the features that...
Over the last decade, machine learning (ML) and artificial intelligence (AI) solutions have been wid...
Despite the success of convolutional neural networks (CNNs) in many academic benchmarks for computer...
Recent development of adversarial attacks has proven that ensemble-based methods outperform traditio...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...
Adversarial machine learning has been an important area of study for the securing of machine learnin...
Machine Learning (ML) models are vulnerable to adversarial samples — human imperceptible changes to ...
Neural networks recently have been used to solve many real-world tasks such as image recognition and...
Machine learning is used in myriad aspects, both in academic research and in everyday life, includin...
From simple time series forecasting to computer security and autonomous systems, machine learning (M...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
peer reviewedAn established way to improve the transferability of black-box evasion attacks is to cr...
Machine learning models are vulnerable to evasion attacks, where the attacker starts from a correctl...
Learning-based classifiers are susceptible to adversarial examples. Existing defence methods are mos...
Adversarial Training is proved to be an efficient method to defend against adversarial examples, bei...
Deep learning has improved the performance of many computer vision tasks. However, the features that...
Over the last decade, machine learning (ML) and artificial intelligence (AI) solutions have been wid...
Despite the success of convolutional neural networks (CNNs) in many academic benchmarks for computer...
Recent development of adversarial attacks has proven that ensemble-based methods outperform traditio...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...