In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic ma...
In the last decades, machine learning has been widely used in security applications like spam filter...
Machine learning has become an important component for many systems and applications including compu...
This thesis presents and evaluates three mitigation techniques for evasion attacks against machine l...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In many security applications a pattern recognition system faces an adversarial classification probl...
Machine learning is widely used in security-sensitive settings like spam and malware detection, alth...
It has been recently shown that it is possible to cheat many machine learning algorithms -- i.e., ...
International audienceThis paper investigates the theory of robustness against adversarial attacks. ...
Modern machine learning algorithms are able to reach an astonishingly high level of performance in ...
Computer vision applications such as image classification and object detection often suffer from adv...
Computer vision applications such as image classification and object detection often suffer from adv...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
© 2018 IEEE. Adversarial learning is the study of machine learning techniques deployed in non-benign...
Statistical Machine Learning is used in many real-world systems, such as web search, network and pow...
In the last decades, machine learning has been widely used in security applications like spam filter...
Machine learning has become an important component for many systems and applications including compu...
This thesis presents and evaluates three mitigation techniques for evasion attacks against machine l...
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and incre...
Abstract. In many security applications a pattern recognition system faces an adversarial classifica...
In many security applications a pattern recognition system faces an adversarial classification probl...
Machine learning is widely used in security-sensitive settings like spam and malware detection, alth...
It has been recently shown that it is possible to cheat many machine learning algorithms -- i.e., ...
International audienceThis paper investigates the theory of robustness against adversarial attacks. ...
Modern machine learning algorithms are able to reach an astonishingly high level of performance in ...
Computer vision applications such as image classification and object detection often suffer from adv...
Computer vision applications such as image classification and object detection often suffer from adv...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
© 2018 IEEE. Adversarial learning is the study of machine learning techniques deployed in non-benign...
Statistical Machine Learning is used in many real-world systems, such as web search, network and pow...
In the last decades, machine learning has been widely used in security applications like spam filter...
Machine learning has become an important component for many systems and applications including compu...
This thesis presents and evaluates three mitigation techniques for evasion attacks against machine l...