ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.03141
  4. Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
v1v2 (latest)

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

8 December 2017
Battista Biggio
Fabio Roli
    AAML
ArXiv (abs)PDFHTML

Papers citing "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"

50 / 590 papers shown
Title
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Lu Zhang
S. Lambotharan
G. Zheng
G. Liao
Basil AsSadhan
Fabio Roli
AAML
13
7
0
13 Jun 2025
Bridging Distribution Shift and AI Safety: Conceptual and Methodological Synergies
Bridging Distribution Shift and AI Safety: Conceptual and Methodological Synergies
Chenruo Liu
Kenan Tang
Yao Qin
Qi Lei
31
0
0
28 May 2025
MultiPhishGuard: An LLM-based Multi-Agent System for Phishing Email Detection
MultiPhishGuard: An LLM-based Multi-Agent System for Phishing Email Detection
Yinuo Xue
Eric Spero
Yun Sing Koh
Giovanni Russello
AAML
26
1
0
26 May 2025
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning
Advije Rizvani
Giovanni Apruzzese
Pavel Laskov
AAML
128
0
0
15 May 2025
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
51
0
0
14 May 2025
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Giulia Marchiori Pietrosanti
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
314
0
0
02 Apr 2025
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
João B. S. Carvalho
Alessandro Torcinovich
Victor Jimenez Rodriguez
Antonio Emanuele Cinà
Carlos Cotrini
Lea Schönherr
J. M. Buhmann
OOD
111
0
0
20 Mar 2025
Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection
Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection
Tianwei Lan
Luca Demetrio
Farid Nait-Abdesselam
Yufei Han
Simone Aonzo
AAML
123
0
0
14 Mar 2025
Energy-Latency Attacks: A New Adversarial Threat to Deep Learning
H. B. Meftah
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
70
0
0
06 Mar 2025
Poisoning Bayesian Inference via Data Deletion and Replication
Matthieu Carreau
Roi Naveiro
William N. Caballero
AAMLKELM
93
1
0
06 Mar 2025
LTL Verification of Memoryful Neural Agents
Mehran Hosseini
A. Lomuscio
Nicola Paoletti
LLMAG
85
0
0
04 Mar 2025
The Cyber Immune System: Harnessing Adversarial Forces for Security Resilience
The Cyber Immune System: Harnessing Adversarial Forces for Security Resilience
Krti Tallam
58
3
0
24 Feb 2025
Keeping up with dynamic attackers: Certifying robustness to adaptive online data poisoning
Avinandan Bose
Laurent Lessard
Maryam Fazel
Krishnamurthy Dvijotham
AAML
71
0
0
23 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
184
0
0
20 Feb 2025
Decoding FL Defenses: Systemization, Pitfalls, and Remedies
Decoding FL Defenses: Systemization, Pitfalls, and Remedies
M. A. Khan
Virat Shejwalkar
Yasra Chandio
Amir Houmansadr
Fatima M. Anwar
AAML
105
0
0
03 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
510
0
0
31 Jan 2025
PRISMe: A Novel LLM-Powered Tool for Interactive Privacy Policy Assessment
Vincent Freiberger
Arthur Fleig
Erik Buchmann
86
2
0
28 Jan 2025
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Ping He
Lorenzo Cavallaro
Shouling Ji
AAML
209
0
0
23 Jan 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
218
1
0
20 Jan 2025
Improving the Efficiency of Self-Supervised Adversarial Training through Latent Clustering-Based Selection
Improving the Efficiency of Self-Supervised Adversarial Training through Latent Clustering-Based Selection
Somrita Ghosh
Yuelin Xu
Xiao Zhang
AAMLOOD
83
0
0
15 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
179
0
0
04 Jan 2025
Emerging Security Challenges of Large Language Models
Emerging Security Challenges of Large Language Models
Herve Debar
Sven Dietrich
Pavel Laskov
Emil C. Lupu
Eirini Ntoutsi
ELM
34
2
0
23 Dec 2024
Position: A taxonomy for reporting and describing AI security incidents
Position: A taxonomy for reporting and describing AI security incidents
L. Bieringer
Kevin Paeth
Andreas Wespi
Kathrin Grosse
Alexandre Alahi
Kathrin Grosse
160
0
0
19 Dec 2024
A Review of the Duality of Adversarial Learning in Network Intrusion:
  Attacks and Countermeasures
A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures
Shalini Saini
Anitha Chennamaneni
Babatunde Sawyerr
AAML
112
1
0
18 Dec 2024
Integrative CAM: Adaptive Layer Fusion for Comprehensive Interpretation
  of CNNs
Integrative CAM: Adaptive Layer Fusion for Comprehensive Interpretation of CNNs
Aniket K. Singh
Debasis Chaudhuri
Manish P. Singh
Samiran Chattopadhyay
107
0
0
02 Dec 2024
A Survey on Adversarial Machine Learning for Code Data: Realistic
  Threats, Countermeasures, and Interpretations
A Survey on Adversarial Machine Learning for Code Data: Realistic Threats, Countermeasures, and Interpretations
Yulong Yang
Haoran Fan
Chenhao Lin
Qian Li
Zhengyu Zhao
Chao Shen
Xiaohong Guan
AAML
75
0
0
12 Nov 2024
Deferred Poisoning: Making the Model More Vulnerable via Hessian
  Singularization
Deferred Poisoning: Making the Model More Vulnerable via Hessian Singularization
Yuhao He
Jinyu Tian
Xianwei Zheng
Li Dong
Yuanman Li
L. Zhang
AAML
88
0
0
06 Nov 2024
On the Robustness of Adversarial Training Against Uncertainty Attacks
On the Robustness of Adversarial Training Against Uncertainty Attacks
Emanuele Ledda
Giovanni Scodeller
Daniele Angioni
Giorgio Piras
Antonio Emanuele Cinà
Giorgio Fumera
Battista Biggio
Fabio Roli
AAML
139
1
0
29 Oct 2024
Active Fourier Auditor for Estimating Distributional Properties of ML
  Models
Active Fourier Auditor for Estimating Distributional Properties of ML Models
Ayoub Ajarra
Bishwamittra Ghosh
Debabrota Basu
MLAU
119
2
0
10 Oct 2024
From Transparency to Accountability and Back: A Discussion of Access and
  Evidence in AI Auditing
From Transparency to Accountability and Back: A Discussion of Access and Evidence in AI Auditing
Sarah H. Cen
Rohan Alur
113
5
0
07 Oct 2024
The poison of dimensionality
The poison of dimensionality
Lê-Nguyên Hoang
77
2
0
25 Sep 2024
UTrace: Poisoning Forensics for Private Collaborative Learning
UTrace: Poisoning Forensics for Private Collaborative Learning
Evan Rose
Hidde Lycklama
Harsh Chaudhari
Anwar Hithnawi
Alina Oprea
69
1
0
23 Sep 2024
NPAT Null-Space Projected Adversarial Training Towards Zero
  Deterioration
NPAT Null-Space Projected Adversarial Training Towards Zero Deterioration
Hanyi Hu
Qiao Han
Kui Chen
Yao Yang
AAML
64
0
0
18 Sep 2024
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
Xinheng Xie
Kureha Yamaguchi
Margaux Leblanc
Simon Malzard
Varun Chhabra
Victoria Nockles
Yue-bo Wu
AAML
238
1
0
08 Sep 2024
Backdoor Defense through Self-Supervised and Generative Learning
Backdoor Defense through Self-Supervised and Generative Learning
Ivan Sabolić
Ivan Grubišić
Siniša Šegvić
AAML
113
0
0
02 Sep 2024
Revisiting Min-Max Optimization Problem in Adversarial Training
Revisiting Min-Max Optimization Problem in Adversarial Training
Sina Hajer Ahmadi
Hassan Bahrami
AAML
63
0
0
20 Aug 2024
Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Francesco Villani
Dario Lazzaro
Antonio Emanuele Cinà
Matteo DellÁmico
Battista Biggio
Fabio Roli
94
1
0
14 Aug 2024
Enhancing TinyML Security: Study of Adversarial Attack Transferability
Enhancing TinyML Security: Study of Adversarial Attack Transferability
Parin Shah
Yuvaraj Govindarajulu
Pavan Kulkarni
Manojkumar Somabhai Parmar
AAML
98
1
0
16 Jul 2024
Does Refusal Training in LLMs Generalize to the Past Tense?
Does Refusal Training in LLMs Generalize to the Past Tense?
Maksym Andriushchenko
Nicolas Flammarion
140
36
0
16 Jul 2024
Deep Learning for Network Anomaly Detection under Data Contamination:
  Evaluating Robustness and Mitigating Performance Degradation
Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation
D'Jeff K. Nkashama
Jordan Masakuna Félicien
Arian Soltani
Jean-Charles Verdier
Pierre Martin Tardif
Marc Frappier
F. Kabanza
AAML
88
1
0
11 Jul 2024
HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Raffaele Mura
Giuseppe Floris
Luca Scionis
Giorgio Piras
Maura Pintor
Ambra Demontis
Giorgio Giacinto
Battista Biggio
Fabio Roli
AAML
88
0
0
11 Jul 2024
A Survey of Attacks on Large Vision-Language Models: Resources,
  Advances, and Future Trends
A Survey of Attacks on Large Vision-Language Models: Resources, Advances, and Future Trends
Daizong Liu
Mingyu Yang
Xiaoye Qu
Pan Zhou
Yu Cheng
Wei Hu
ELMAAML
108
32
0
10 Jul 2024
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Feilong Wang
Xin Wang
X. Ban
AAML
58
11
0
06 Jul 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion
  Models: Injecting Disguised Vulnerabilities against Strong Detection
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
AAMLSILM
76
26
0
10 Jun 2024
Certified Robustness to Data Poisoning in Gradient-Based Training
Certified Robustness to Data Poisoning in Gradient-Based Training
Philip Sosnin
Mark N. Müller
Maximilian Baader
Calvin Tsay
Matthew Wicker
AAMLSILM
114
8
0
09 Jun 2024
Batch-in-Batch: a new adversarial training framework for initial
  perturbation and sample selection
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Yinting Wu
Pai Peng
Bo Cai
Le Li
.
AAML
66
0
0
06 Jun 2024
Verifiably Robust Conformal Prediction
Verifiably Robust Conformal Prediction
Linus Jeary
Tom Kuipers
Mehran Hosseini
Nicola Paoletti
AAML
89
6
0
29 May 2024
Breaking the False Sense of Security in Backdoor Defense through
  Re-Activation Attack
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack
Mingli Zhu
Siyuan Liang
Baoyuan Wu
AAML
119
18
0
25 May 2024
Robust width: A lightweight and certifiable adversarial defense
Robust width: A lightweight and certifiable adversarial defense
Jonathan Peck
Bart Goossens
AAML
76
2
0
24 May 2024
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples
  in Malware Detection
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Marco Rando
Christian Scano
Lorenzo Rosasco
Fabio Roli
AAML
68
2
0
23 May 2024
1234...101112
Next