ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.03141
  4. Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

8 December 2017
Battista Biggio
Fabio Roli
    AAML
ArXivPDFHTML

Papers citing "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"

50 / 210 papers shown
Title
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
26
0
0
14 May 2025
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Giulia Marchiori Pietrosanti
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
89
0
0
02 Apr 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
62
0
0
20 Feb 2025
Decoding FL Defenses: Systemization, Pitfalls, and Remedies
Decoding FL Defenses: Systemization, Pitfalls, and Remedies
M. A. Khan
Virat Shejwalkar
Yasra Chandio
Amir Houmansadr
Fatima M. Anwar
AAML
38
0
0
03 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
191
0
0
31 Jan 2025
PRISMe: A Novel LLM-Powered Tool for Interactive Privacy Policy Assessment
Vincent Freiberger
Arthur Fleig
Erik Buchmann
50
2
0
28 Jan 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
109
0
0
20 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
42
0
0
04 Jan 2025
Position: A taxonomy for reporting and describing AI security incidents
Position: A taxonomy for reporting and describing AI security incidents
L. Bieringer
Kevin Paeth
Andreas Wespi
Kathrin Grosse
Alexandre Alahi
Kathrin Grosse
78
0
0
19 Dec 2024
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
Xinheng Xie
Kureha Yamaguchi
Margaux Leblanc
Simon Malzard
Varun Chhabra
Victoria Nockles
Yue-bo Wu
AAML
37
0
0
08 Sep 2024
Does Refusal Training in LLMs Generalize to the Past Tense?
Does Refusal Training in LLMs Generalize to the Past Tense?
Maksym Andriushchenko
Nicolas Flammarion
50
27
0
16 Jul 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion
  Models: Injecting Disguised Vulnerabilities against Strong Detection
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
AAML
SILM
43
17
0
10 Jun 2024
SLIFER: Investigating Performance and Robustness of Malware Detection
  Pipelines
SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Andrea Ponte
Dmitrijs Trizna
Luca Demetrio
Battista Biggio
Ivan Tesfai Ogbu
Fabio Roli
49
0
0
23 May 2024
Effective and Robust Adversarial Training against Data and Label
  Corruptions
Effective and Robust Adversarial Training against Data and Label Corruptions
Pengfei Zhang
Zi Huang
Xin-Shun Xu
Guangdong Bai
51
4
0
07 May 2024
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
M. Kozák
Luca Demetrio
Dmitrijs Trizna
Fabio Roli
AAML
39
0
0
04 May 2024
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
Antonio Emanuele Cinà
Jérôme Rony
Maura Pintor
Luca Demetrio
Ambra Demontis
Battista Biggio
Ismail Ben Ayed
Fabio Roli
ELM
AAML
SILM
44
8
0
30 Apr 2024
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
AAML
97
160
0
02 Apr 2024
Benchmarking the Robustness of Temporal Action Detection Models Against
  Temporal Corruptions
Benchmarking the Robustness of Temporal Action Detection Models Against Temporal Corruptions
Runhao Zeng
Xiaoyong Chen
Jiaming Liang
Huisi Wu
Guangzhong Cao
Yong Guo
AAML
39
4
0
29 Mar 2024
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer
  IoT Devices
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices
Xueshuo Xie
Haoxu Wang
Zhaolong Jian
Tao Li
Wei Wang
Zhiwei Xu
Gui-Ping Wang
41
2
0
19 Mar 2024
Manipulating hidden-Markov-model inferences by corrupting batch data
Manipulating hidden-Markov-model inferences by corrupting batch data
William N. Caballero
Jose Manuel Camacho
Tahir Ekin
Roi Naveiro
AAML
18
1
0
19 Feb 2024
Efficient Availability Attacks against Supervised and Contrastive
  Learning Simultaneously
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously
Yihan Wang
Yifan Zhu
Xiao-Shan Gao
AAML
33
6
0
06 Feb 2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Zeliang Kan
Shae McFadden
Daniel Arp
Feargus Pendlebury
Roberto Jordaney
Johannes Kinder
Fabio Pierazzi
Lorenzo Cavallaro
22
1
0
02 Feb 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive
  Attackers for Security Applications
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
21
1
0
20 Jan 2024
Neither hype nor gloom do DNNs justice
Neither hype nor gloom do DNNs justice
Gaurav Malhotra
Christian Tsvetkov
B. D. Evans
27
117
0
08 Dec 2023
PACOL: Poisoning Attacks Against Continual Learners
PACOL: Poisoning Attacks Against Continual Learners
Huayu Li
G. Ditzler
AAML
25
2
0
18 Nov 2023
When to Trust AI: Advances and Challenges for Certification of Neural
  Networks
When to Trust AI: Advances and Challenges for Certification of Neural Networks
Marta Kwiatkowska
Xiyue Zhang
AAML
37
8
0
20 Sep 2023
Adversarial Attacks Against Uncertainty Quantification
Adversarial Attacks Against Uncertainty Quantification
Emanuele Ledda
Daniele Angioni
Giorgio Piras
Giorgio Fumera
Battista Biggio
Fabio Roli
AAML
35
2
0
19 Sep 2023
The Promise and Peril of Artificial Intelligence -- Violet Teaming
  Offers a Balanced Path Forward
The Promise and Peril of Artificial Intelligence -- Violet Teaming Offers a Balanced Path Forward
A. Titus
Adam Russell
36
1
0
28 Aug 2023
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
Hejia Geng
Peng Li
AAML
34
3
0
20 Aug 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
32
8
0
14 Jun 2023
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion
  Detection
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese
Pavel Laskov
J. Schneider
44
25
0
30 Apr 2023
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment
  using Adversarial Learning
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Thorsten Eisenhofer
Erwin Quiring
Jonas Moller
Doreen Riepel
Thorsten Holz
Konrad Rieck
AAML
26
6
0
25 Mar 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial
  Robustness
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILM
AAML
32
8
0
17 Mar 2023
Use Perturbations when Learning from Explanations
Use Perturbations when Learning from Explanations
Juyeon Heo
Vihari Piratla
Matthew Wicker
Adrian Weller
AAML
38
1
0
11 Mar 2023
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Mingjie Sun
Zico Kolter
AAML
23
12
0
01 Mar 2023
Measuring Equality in Machine Learning Security Defenses: A Case Study
  in Speech Recognition
Measuring Equality in Machine Learning Security Defenses: A Case Study in Speech Recognition
Luke E. Richards
Edward Raff
Cynthia Matuszek
AAML
16
2
0
17 Feb 2023
Inference Time Evidences of Adversarial Attacks for Forensic on
  Transformers
Inference Time Evidences of Adversarial Attacks for Forensic on Transformers
Hugo Lemarchant
Liang Li
Yiming Qian
Yuta Nakashima
Hajime Nagahara
ViT
AAML
43
0
0
31 Jan 2023
Identifying Adversarially Attackable and Robust Samples
Identifying Adversarially Attackable and Robust Samples
Vyas Raina
Mark J. F. Gales
AAML
33
3
0
30 Jan 2023
Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples
Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples
Jiaming Zhang
Xingjun Ma
Qiaomin Yi
Jitao Sang
Yugang Jiang
Yaowei Wang
Changsheng Xu
21
24
0
31 Dec 2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
31
75
0
29 Dec 2022
A survey on text generation using generative adversarial networks
A survey on text generation using generative adversarial networks
Gustavo de Rosa
João Paulo Papa
GAN
32
89
0
20 Dec 2022
A Survey on Reinforcement Learning Security with Application to
  Autonomous Driving
A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Ambra Demontis
Maura Pintor
Luca Demetrio
Kathrin Grosse
Hsiao-Ying Lin
Chengfang Fang
Battista Biggio
Fabio Roli
AAML
42
4
0
12 Dec 2022
Enhancing Quantum Adversarial Robustness by Randomized Encodings
Enhancing Quantum Adversarial Robustness by Randomized Encodings
Weiyuan Gong
D. Yuan
Weikang Li
D. Deng
AAML
24
19
0
05 Dec 2022
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning
  Few-Shot Meta-Learners
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners
E. T. Oldewage
J. Bronskill
Richard Turner
24
3
0
23 Nov 2022
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Zhengyu Zhao
Hanwei Zhang
Renjue Li
R. Sicre
Laurent Amsaleg
Michael Backes
AAML
27
20
0
17 Nov 2022
Music Instrument Classification Reprogrammed
Music Instrument Classification Reprogrammed
Hsin-Hung Chen
Alexander Lerch
24
4
0
15 Nov 2022
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks
  against Phishing Website Detectors using Machine Learning
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Ying Yuan
Giovanni Apruzzese
Mauro Conti
AAML
23
19
0
24 Oct 2022
Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor
  Attacks in Federated Learning
Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Yuxin Wen
Jonas Geiping
Liam H. Fowl
Hossein Souri
Ramalingam Chellappa
Micah Goldblum
Tom Goldstein
AAML
SILM
FedML
30
9
0
17 Oct 2022
Attribute Inference Attacks in Online Multiplayer Video Games: a Case
  Study on Dota2
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Pier Paolo Tricomi
Lisa Facciolo
Giovanni Apruzzese
Mauro Conti
31
7
0
17 Oct 2022
When are Local Queries Useful for Robust Learning?
When are Local Queries Useful for Robust Learning?
Pascale Gourdeau
Varun Kanade
Marta Z. Kwiatkowska
J. Worrell
OOD
37
1
0
12 Oct 2022
12345
Next