Normal decision trees are effective but simple machine learning models that are prone to adversarial attacks. Nevertheless, the operation of decision trees under adversarial attacks has received relatively little research, and robust decision tree algorithms that can withstand these attacks have only been developed in recent years. The purpose of this work is to determine how accurately, robustly, and time-efficiently different robust decision tree models perform under the attack compared to each other, and how accurately they perform compared to non-robust decision tree models under attack. Adversarial attacks create adversarial examples, that allow the attacker to try and affect the decision tree’s ability to perform accurately in give...
The problem of adversarial robustness has been studied extensively for neural networks. However, for...
Machine learning has proved invaluable for a range of different tasks, yet it also proved vulnerable...
Brute-force attacks are a common type of cyber attack in which an attacker repeatedly tries to guess...
Machine learning is used for security purposes, to differ between the benign and the malicious. Wher...
Recently it has been shown that many machine learning models are vulnerable to adversarial examples:...
Machine learning algorithms, however effective, are known to be vulnerable in adversarial scenarios ...
© 2019 by the Author(S). Although adversarial examples and model robustness have been extensively st...
Decision trees are a popular choice of explainable model, but just like neural networks, they suffer...
Despite its success and popularity, machine learning is now recognized as vulnerable to evasion atta...
Decision trees are integral to machine learning, with their robustness being a critical measure of e...
In this paper we criticize the robustness measure traditionally employed to assess the performance o...
Context. Machine learning is a constantly developing subfield within the artificial intelligence fie...
Adversarial training is a prominent approach to make machine learning (ML) models resilient to adver...
Verifying the robustness of machine learning models against evasion attacks at test time is an impor...
Defenses against adversarial attacks are essential to ensure the reliability of machine learning mod...
The problem of adversarial robustness has been studied extensively for neural networks. However, for...
Machine learning has proved invaluable for a range of different tasks, yet it also proved vulnerable...
Brute-force attacks are a common type of cyber attack in which an attacker repeatedly tries to guess...
Machine learning is used for security purposes, to differ between the benign and the malicious. Wher...
Recently it has been shown that many machine learning models are vulnerable to adversarial examples:...
Machine learning algorithms, however effective, are known to be vulnerable in adversarial scenarios ...
© 2019 by the Author(S). Although adversarial examples and model robustness have been extensively st...
Decision trees are a popular choice of explainable model, but just like neural networks, they suffer...
Despite its success and popularity, machine learning is now recognized as vulnerable to evasion atta...
Decision trees are integral to machine learning, with their robustness being a critical measure of e...
In this paper we criticize the robustness measure traditionally employed to assess the performance o...
Context. Machine learning is a constantly developing subfield within the artificial intelligence fie...
Adversarial training is a prominent approach to make machine learning (ML) models resilient to adver...
Verifying the robustness of machine learning models against evasion attacks at test time is an impor...
Defenses against adversarial attacks are essential to ensure the reliability of machine learning mod...
The problem of adversarial robustness has been studied extensively for neural networks. However, for...
Machine learning has proved invaluable for a range of different tasks, yet it also proved vulnerable...
Brute-force attacks are a common type of cyber attack in which an attacker repeatedly tries to guess...