This thesis presents and evaluates three mitigation techniques for evasion attacks against machine learning based detection pipelines. Machine learning based detection pipelines provide much of the security in modern computerized system. For instance, these pipelines are responsible for the detection of undesirable content on computing platforms and Internet-based services, such as malicious software and email spam. By its adversarial nature, the security application domain exhibits a permanent arms race between attackers who aim to avoid, or evade, detection and the pipeline's maintainers whose aim is to catch all undesirable content.The first part of this thesis examines a defense technique for the concrete application domain of comment s...
Machine learning has yield significant advances in decision-making for complex systems, but are they...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
Machine learning has become an important component for many systems and applications including compu...
Statistical Machine Learning is used in many real-world systems, such as web search, network and pow...
Over the last decade, machine learning (ML) and artificial intelligence (AI) solutions have been wid...
The security of machine learning systems has become a great concern in many real-world applications ...
In security-sensitive applications, the success of machine learning depends on a thorough vetting of...
Machine learning is widely used in security-sensitive settings like spam and malware detection, alth...
In recent years, machine learning (ML) has become an important part to yield security and privacy in...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
Adversarial attacks represent a critical issue that prevents the reliable integration of machine lea...
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that brea...
A myriad of recent literary works has leveraged generative adversarial networks (GANs) to generate u...
Machine learning (ML) classifiers have been increasingly used in Android malware detection and count...
Machine learning has yield significant advances in decision-making for complex systems, but are they...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
Machine learning has become an important component for many systems and applications including compu...
Statistical Machine Learning is used in many real-world systems, such as web search, network and pow...
Over the last decade, machine learning (ML) and artificial intelligence (AI) solutions have been wid...
The security of machine learning systems has become a great concern in many real-world applications ...
In security-sensitive applications, the success of machine learning depends on a thorough vetting of...
Machine learning is widely used in security-sensitive settings like spam and malware detection, alth...
In recent years, machine learning (ML) has become an important part to yield security and privacy in...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
Adversarial attacks represent a critical issue that prevents the reliable integration of machine lea...
Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that brea...
A myriad of recent literary works has leveraged generative adversarial networks (GANs) to generate u...
Machine learning (ML) classifiers have been increasingly used in Android malware detection and count...
Machine learning has yield significant advances in decision-making for complex systems, but are they...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
Machine learning has become an important component for many systems and applications including compu...