International audienceCharacterizing and assessing the adversarial risk of a classifier with categorical inputs has been a practically important yet rarely explored research problem. Conventional wisdom attributes the difficulty of solving the problem to its combinatorial nature. Previous research efforts tackling this problem are specific to use cases and heavily depend on domain knowledge. Such limitations prevent their general applicability in real-world applications with categorical data. Our study novelly shows that provably optimal adversarial robustness assessment is computationally feasible for any classifier with a mild smoothness constraint. We theoretically analyze the impact factors of adversarial vulnerability of a classifier w...
Abstract—In adversarial classification tasks like spam filtering, intrusion detection in computer ne...
Modern machine learning models can be difficult to probe and understand after they have been trained...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
International audienceCharacterizing and assessing the adversarial risk of a classifier with categor...
International audienceMachine Learning-as-a-Service systems (MLaaS) have been largely developed for ...
Machine Learning-as-a-Service systems (MLaaS) have been largely developed for cybersecurity-critical...
Machine learning (ML) classification is increasingly used in safety-critical systems. Protecting ML ...
International audienceDespite achieving impressive performance, state-of-the-art classifiers remain ...
Evasion attack in multi-label learning systems is an interesting, widely witnessed, yet rarely explo...
Our work targets at searching feasible adversarial perturbation to attack a classifier with high-di...
International audienceThis paper investigates the theory of robustness against adversarial attacks. ...
Risse N, Göpfert C, Göpfert JP. How to Compare Adversarial Robustness of Classifiers from a Global P...
Modern machine learning algorithms are able to reach an astonishingly high level of performance in ...
Pattern recognition systems based on machine learning techniques are nowadays widely used in many di...
In the past few years, evaluating on adversarial examples has become a standard procedure to meas...
Abstract—In adversarial classification tasks like spam filtering, intrusion detection in computer ne...
Modern machine learning models can be difficult to probe and understand after they have been trained...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
International audienceCharacterizing and assessing the adversarial risk of a classifier with categor...
International audienceMachine Learning-as-a-Service systems (MLaaS) have been largely developed for ...
Machine Learning-as-a-Service systems (MLaaS) have been largely developed for cybersecurity-critical...
Machine learning (ML) classification is increasingly used in safety-critical systems. Protecting ML ...
International audienceDespite achieving impressive performance, state-of-the-art classifiers remain ...
Evasion attack in multi-label learning systems is an interesting, widely witnessed, yet rarely explo...
Our work targets at searching feasible adversarial perturbation to attack a classifier with high-di...
International audienceThis paper investigates the theory of robustness against adversarial attacks. ...
Risse N, Göpfert C, Göpfert JP. How to Compare Adversarial Robustness of Classifiers from a Global P...
Modern machine learning algorithms are able to reach an astonishingly high level of performance in ...
Pattern recognition systems based on machine learning techniques are nowadays widely used in many di...
In the past few years, evaluating on adversarial examples has become a standard procedure to meas...
Abstract—In adversarial classification tasks like spam filtering, intrusion detection in computer ne...
Modern machine learning models can be difficult to probe and understand after they have been trained...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...