Adversarial machine learning

@inproceedings{Huang2011AdversarialML,
  title={Adversarial machine learning},
  author={Ling Huang and A. Joseph and B. Nelson and Benjamin I. P. Rubinstein and J. Tygar},
  booktitle={AISec '11},
  year={2011}
}
  • Ling Huang, A. Joseph, +2 authors J. Tygar
  • Published in AISec '11 2011
  • Computer Science
  • In this paper (expanded from an invited talk at AISEC 2010), we discuss an emerging field of study: adversarial machine learning---the study of effective machine learning techniques against an adversarial opponent. In this paper, we: give a taxonomy for classifying attacks against online machine learning algorithms; discuss application-specific factors that limit an adversary's capabilities; introduce two models for modeling an adversary's capabilities; explore the limits of an adversary's… CONTINUE READING

    Figures and Topics from this paper.

    Evasion Attacks against Machine Learning at Test Time
    • 843
    • PDF
    Boosting Adversarial Attacks with Momentum
    • 490
    • PDF
    Security Matters: A Survey on Adversarial Machine Learning
    • 4
    • PDF
    Discovering Adversarial Examples with Momentum
    • 29
    • PDF
    Rallying Adversarial Techniques against Deep Learning for Network Security
    • 7
    • PDF
    Adversarial Feature Selection Against Evasion Attacks
    • 139
    • Highly Influenced
    • PDF
    Approaches to adversarial drift
    • 49
    • PDF
    Secure Kernel Machines against Evasion Attacks
    • 45
    Adversarial Examples in Modern Machine Learning: A Review
    • 7
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-8 OF 8 REFERENCES
    Adversarial learning
    • 538
    • Highly Influential
    • PDF
    Mimicry attacks on host-based intrusion detection systems
    • 705
    • Highly Influential
    • PDF
    Differential Privacy
    • 3,607
    • Highly Influential
    • PDF
    Differentially Private Empirical Risk Minimization
    • 732
    • Highly Influential
    • PDF
    Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
    • 233
    • Highly Influential
    • PDF
    An introduction to Support Vector Machines
    • 3,407
    • Highly Influential
    • PDF
    Revealing information while preserving privacy
    • 839
    • Highly Influential
    • PDF
    Diagnosing network-wide traffic anomalies
    • 719
    • Highly Influential
    • PDF