Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1712.03141
Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
8 December 2017
Battista Biggio
Fabio Roli
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"
50 / 210 papers shown
Title
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
26
0
0
14 May 2025
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Giulia Marchiori Pietrosanti
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
89
0
0
02 Apr 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
62
0
0
20 Feb 2025
Decoding FL Defenses: Systemization, Pitfalls, and Remedies
M. A. Khan
Virat Shejwalkar
Yasra Chandio
Amir Houmansadr
Fatima M. Anwar
AAML
38
0
0
03 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
191
0
0
31 Jan 2025
PRISMe: A Novel LLM-Powered Tool for Interactive Privacy Policy Assessment
Vincent Freiberger
Arthur Fleig
Erik Buchmann
50
2
0
28 Jan 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
109
0
0
20 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
42
0
0
04 Jan 2025
Position: A taxonomy for reporting and describing AI security incidents
L. Bieringer
Kevin Paeth
Andreas Wespi
Kathrin Grosse
Alexandre Alahi
Kathrin Grosse
78
0
0
19 Dec 2024
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
Xinheng Xie
Kureha Yamaguchi
Margaux Leblanc
Simon Malzard
Varun Chhabra
Victoria Nockles
Yue-bo Wu
AAML
37
0
0
08 Sep 2024
Does Refusal Training in LLMs Generalize to the Past Tense?
Maksym Andriushchenko
Nicolas Flammarion
50
27
0
16 Jul 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
AAML
SILM
43
17
0
10 Jun 2024
SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Andrea Ponte
Dmitrijs Trizna
Luca Demetrio
Battista Biggio
Ivan Tesfai Ogbu
Fabio Roli
49
0
0
23 May 2024
Effective and Robust Adversarial Training against Data and Label Corruptions
Pengfei Zhang
Zi Huang
Xin-Shun Xu
Guangdong Bai
51
4
0
07 May 2024
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
M. Kozák
Luca Demetrio
Dmitrijs Trizna
Fabio Roli
AAML
39
0
0
04 May 2024
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
Antonio Emanuele Cinà
Jérôme Rony
Maura Pintor
Luca Demetrio
Ambra Demontis
Battista Biggio
Ismail Ben Ayed
Fabio Roli
ELM
AAML
SILM
44
8
0
30 Apr 2024
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
AAML
97
160
0
02 Apr 2024
Benchmarking the Robustness of Temporal Action Detection Models Against Temporal Corruptions
Runhao Zeng
Xiaoyong Chen
Jiaming Liang
Huisi Wu
Guangzhong Cao
Yong Guo
AAML
39
4
0
29 Mar 2024
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices
Xueshuo Xie
Haoxu Wang
Zhaolong Jian
Tao Li
Wei Wang
Zhiwei Xu
Gui-Ping Wang
41
2
0
19 Mar 2024
Manipulating hidden-Markov-model inferences by corrupting batch data
William N. Caballero
Jose Manuel Camacho
Tahir Ekin
Roi Naveiro
AAML
18
1
0
19 Feb 2024
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously
Yihan Wang
Yifan Zhu
Xiao-Shan Gao
AAML
33
6
0
06 Feb 2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Zeliang Kan
Shae McFadden
Daniel Arp
Feargus Pendlebury
Roberto Jordaney
Johannes Kinder
Fabio Pierazzi
Lorenzo Cavallaro
22
1
0
02 Feb 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
21
1
0
20 Jan 2024
Neither hype nor gloom do DNNs justice
Gaurav Malhotra
Christian Tsvetkov
B. D. Evans
27
117
0
08 Dec 2023
PACOL: Poisoning Attacks Against Continual Learners
Huayu Li
G. Ditzler
AAML
25
2
0
18 Nov 2023
When to Trust AI: Advances and Challenges for Certification of Neural Networks
Marta Kwiatkowska
Xiyue Zhang
AAML
37
8
0
20 Sep 2023
Adversarial Attacks Against Uncertainty Quantification
Emanuele Ledda
Daniele Angioni
Giorgio Piras
Giorgio Fumera
Battista Biggio
Fabio Roli
AAML
35
2
0
19 Sep 2023
The Promise and Peril of Artificial Intelligence -- Violet Teaming Offers a Balanced Path Forward
A. Titus
Adam Russell
36
1
0
28 Aug 2023
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
Hejia Geng
Peng Li
AAML
34
3
0
20 Aug 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
32
8
0
14 Jun 2023
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese
Pavel Laskov
J. Schneider
44
25
0
30 Apr 2023
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Thorsten Eisenhofer
Erwin Quiring
Jonas Moller
Doreen Riepel
Thorsten Holz
Konrad Rieck
AAML
26
6
0
25 Mar 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILM
AAML
32
8
0
17 Mar 2023
Use Perturbations when Learning from Explanations
Juyeon Heo
Vihari Piratla
Matthew Wicker
Adrian Weller
AAML
38
1
0
11 Mar 2023
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Mingjie Sun
Zico Kolter
AAML
23
12
0
01 Mar 2023
Measuring Equality in Machine Learning Security Defenses: A Case Study in Speech Recognition
Luke E. Richards
Edward Raff
Cynthia Matuszek
AAML
16
2
0
17 Feb 2023
Inference Time Evidences of Adversarial Attacks for Forensic on Transformers
Hugo Lemarchant
Liang Li
Yiming Qian
Yuta Nakashima
Hajime Nagahara
ViT
AAML
43
0
0
31 Jan 2023
Identifying Adversarially Attackable and Robust Samples
Vyas Raina
Mark J. F. Gales
AAML
33
3
0
30 Jan 2023
Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples
Jiaming Zhang
Xingjun Ma
Qiaomin Yi
Jitao Sang
Yugang Jiang
Yaowei Wang
Changsheng Xu
21
24
0
31 Dec 2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
31
75
0
29 Dec 2022
A survey on text generation using generative adversarial networks
Gustavo de Rosa
João Paulo Papa
GAN
32
89
0
20 Dec 2022
A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Ambra Demontis
Maura Pintor
Luca Demetrio
Kathrin Grosse
Hsiao-Ying Lin
Chengfang Fang
Battista Biggio
Fabio Roli
AAML
42
4
0
12 Dec 2022
Enhancing Quantum Adversarial Robustness by Randomized Encodings
Weiyuan Gong
D. Yuan
Weikang Li
D. Deng
AAML
24
19
0
05 Dec 2022
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners
E. T. Oldewage
J. Bronskill
Richard Turner
24
3
0
23 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
Music Instrument Classification Reprogrammed
Hsin-Hung Chen
Alexander Lerch
24
4
0
15 Nov 2022
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Ying Yuan
Giovanni Apruzzese
Mauro Conti
AAML
23
19
0
24 Oct 2022
Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Yuxin Wen
Jonas Geiping
Liam H. Fowl
Hossein Souri
Ramalingam Chellappa
Micah Goldblum
Tom Goldstein
AAML
SILM
FedML
30
9
0
17 Oct 2022
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Pier Paolo Tricomi
Lisa Facciolo
Giovanni Apruzzese
Mauro Conti
31
7
0
17 Oct 2022
When are Local Queries Useful for Robust Learning?
Pascale Gourdeau
Varun Kanade
Marta Z. Kwiatkowska
J. Worrell
OOD
37
1
0
12 Oct 2022
1
2
3
4
5
Next