Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1712.03141
Cited By
v1
v2 (latest)
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
8 December 2017
Battista Biggio
Fabio Roli
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"
50 / 590 papers shown
Title
Attention-based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices
Lu Zhang
S. Lambotharan
G. Zheng
G. Liao
Basil AsSadhan
Fabio Roli
AAML
13
7
0
13 Jun 2025
Bridging Distribution Shift and AI Safety: Conceptual and Methodological Synergies
Chenruo Liu
Kenan Tang
Yao Qin
Qi Lei
31
0
0
28 May 2025
MultiPhishGuard: An LLM-based Multi-Agent System for Phishing Email Detection
Yinuo Xue
Eric Spero
Yun Sing Koh
Giovanni Russello
AAML
26
1
0
26 May 2025
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning
Advije Rizvani
Giovanni Apruzzese
Pavel Laskov
AAML
128
0
0
15 May 2025
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
51
0
0
14 May 2025
Benchmarking the Spatial Robustness of DNNs via Natural and Adversarial Localized Corruptions
Giulia Marchiori Pietrosanti
Giulio Rossolini
Alessandro Biondi
Giorgio Buttazzo
AAML
314
0
0
02 Apr 2025
Rethinking Robustness in Machine Learning: A Posterior Agreement Approach
João B. S. Carvalho
Alessandro Torcinovich
Victor Jimenez Rodriguez
Antonio Emanuele Cinà
Carlos Cotrini
Lea Schönherr
J. M. Buhmann
OOD
111
0
0
20 Mar 2025
Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection
Tianwei Lan
Luca Demetrio
Farid Nait-Abdesselam
Yufei Han
Simone Aonzo
AAML
123
0
0
14 Mar 2025
Energy-Latency Attacks: A New Adversarial Threat to Deep Learning
H. B. Meftah
W. Hamidouche
Sid Ahmed Fezza
Olivier Déforges
AAML
70
0
0
06 Mar 2025
Poisoning Bayesian Inference via Data Deletion and Replication
Matthieu Carreau
Roi Naveiro
William N. Caballero
AAML
KELM
93
1
0
06 Mar 2025
LTL Verification of Memoryful Neural Agents
Mehran Hosseini
A. Lomuscio
Nicola Paoletti
LLMAG
85
0
0
04 Mar 2025
The Cyber Immune System: Harnessing Adversarial Forces for Security Resilience
Krti Tallam
58
3
0
24 Feb 2025
Keeping up with dynamic attackers: Certifying robustness to adaptive online data poisoning
Avinandan Bose
Laurent Lessard
Maryam Fazel
Krishnamurthy Dvijotham
AAML
71
0
0
23 Feb 2025
Carefully Blending Adversarial Training, Purification, and Aggregation Improves Adversarial Robustness
Emanuele Ballarin
A. Ansuini
Luca Bortolussi
AAML
184
0
0
20 Feb 2025
Decoding FL Defenses: Systemization, Pitfalls, and Remedies
M. A. Khan
Virat Shejwalkar
Yasra Chandio
Amir Houmansadr
Fatima M. Anwar
AAML
105
0
0
03 Feb 2025
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
Ching-Chun Chang
Fan-Yun Chen
Shih-Hong Gu
Kai Gao
Hanrui Wang
Isao Echizen
AAML
510
0
0
31 Jan 2025
PRISMe: A Novel LLM-Powered Tool for Interactive Privacy Policy Assessment
Vincent Freiberger
Arthur Fleig
Erik Buchmann
86
2
0
28 Jan 2025
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Ping He
Lorenzo Cavallaro
Shouling Ji
AAML
209
0
0
23 Jan 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
218
1
0
20 Jan 2025
Improving the Efficiency of Self-Supervised Adversarial Training through Latent Clustering-Based Selection
Somrita Ghosh
Yuelin Xu
Xiao Zhang
AAML
OOD
83
0
0
15 Jan 2025
Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50
Umesh Yadav
Suman Niraula
Gaurav Kumar Gupta
Bicky Yadav
SILM
179
0
0
04 Jan 2025
Emerging Security Challenges of Large Language Models
Herve Debar
Sven Dietrich
Pavel Laskov
Emil C. Lupu
Eirini Ntoutsi
ELM
34
2
0
23 Dec 2024
Position: A taxonomy for reporting and describing AI security incidents
L. Bieringer
Kevin Paeth
Andreas Wespi
Kathrin Grosse
Alexandre Alahi
Kathrin Grosse
160
0
0
19 Dec 2024
A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures
Shalini Saini
Anitha Chennamaneni
Babatunde Sawyerr
AAML
112
1
0
18 Dec 2024
Integrative CAM: Adaptive Layer Fusion for Comprehensive Interpretation of CNNs
Aniket K. Singh
Debasis Chaudhuri
Manish P. Singh
Samiran Chattopadhyay
107
0
0
02 Dec 2024
A Survey on Adversarial Machine Learning for Code Data: Realistic Threats, Countermeasures, and Interpretations
Yulong Yang
Haoran Fan
Chenhao Lin
Qian Li
Zhengyu Zhao
Chao Shen
Xiaohong Guan
AAML
75
0
0
12 Nov 2024
Deferred Poisoning: Making the Model More Vulnerable via Hessian Singularization
Yuhao He
Jinyu Tian
Xianwei Zheng
Li Dong
Yuanman Li
L. Zhang
AAML
88
0
0
06 Nov 2024
On the Robustness of Adversarial Training Against Uncertainty Attacks
Emanuele Ledda
Giovanni Scodeller
Daniele Angioni
Giorgio Piras
Antonio Emanuele Cinà
Giorgio Fumera
Battista Biggio
Fabio Roli
AAML
139
1
0
29 Oct 2024
Active Fourier Auditor for Estimating Distributional Properties of ML Models
Ayoub Ajarra
Bishwamittra Ghosh
Debabrota Basu
MLAU
119
2
0
10 Oct 2024
From Transparency to Accountability and Back: A Discussion of Access and Evidence in AI Auditing
Sarah H. Cen
Rohan Alur
113
5
0
07 Oct 2024
The poison of dimensionality
Lê-Nguyên Hoang
77
2
0
25 Sep 2024
UTrace: Poisoning Forensics for Private Collaborative Learning
Evan Rose
Hidde Lycklama
Harsh Chaudhari
Anwar Hithnawi
Alina Oprea
69
1
0
23 Sep 2024
NPAT Null-Space Projected Adversarial Training Towards Zero Deterioration
Hanyi Hu
Qiao Han
Kui Chen
Yao Yang
AAML
64
0
0
18 Sep 2024
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures
Xinheng Xie
Kureha Yamaguchi
Margaux Leblanc
Simon Malzard
Varun Chhabra
Victoria Nockles
Yue-bo Wu
AAML
238
1
0
08 Sep 2024
Backdoor Defense through Self-Supervised and Generative Learning
Ivan Sabolić
Ivan Grubišić
Siniša Šegvić
AAML
113
0
0
02 Sep 2024
Revisiting Min-Max Optimization Problem in Adversarial Training
Sina Hajer Ahmadi
Hassan Bahrami
AAML
63
0
0
20 Aug 2024
Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms
Francesco Villani
Dario Lazzaro
Antonio Emanuele Cinà
Matteo DellÁmico
Battista Biggio
Fabio Roli
94
1
0
14 Aug 2024
Enhancing TinyML Security: Study of Adversarial Attack Transferability
Parin Shah
Yuvaraj Govindarajulu
Pavan Kulkarni
Manojkumar Somabhai Parmar
AAML
98
1
0
16 Jul 2024
Does Refusal Training in LLMs Generalize to the Past Tense?
Maksym Andriushchenko
Nicolas Flammarion
140
36
0
16 Jul 2024
Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation
D'Jeff K. Nkashama
Jordan Masakuna Félicien
Arian Soltani
Jean-Charles Verdier
Pierre Martin Tardif
Marc Frappier
F. Kabanza
AAML
88
1
0
11 Jul 2024
HO-FMN: Hyperparameter Optimization for Fast Minimum-Norm Attacks
Raffaele Mura
Giuseppe Floris
Luca Scionis
Giorgio Piras
Maura Pintor
Ambra Demontis
Giorgio Giacinto
Battista Biggio
Fabio Roli
AAML
88
0
0
11 Jul 2024
A Survey of Attacks on Large Vision-Language Models: Resources, Advances, and Future Trends
Daizong Liu
Mingyu Yang
Xiaoye Qu
Pan Zhou
Yu Cheng
Wei Hu
ELM
AAML
108
32
0
10 Jul 2024
Data Poisoning Attacks in Intelligent Transportation Systems: A Survey
Feilong Wang
Xin Wang
X. Ban
AAML
58
11
0
06 Jul 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
AAML
SILM
76
26
0
10 Jun 2024
Certified Robustness to Data Poisoning in Gradient-Based Training
Philip Sosnin
Mark N. Müller
Maximilian Baader
Calvin Tsay
Matthew Wicker
AAML
SILM
114
8
0
09 Jun 2024
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Yinting Wu
Pai Peng
Bo Cai
Le Li
.
AAML
66
0
0
06 Jun 2024
Verifiably Robust Conformal Prediction
Linus Jeary
Tom Kuipers
Mehran Hosseini
Nicola Paoletti
AAML
89
6
0
29 May 2024
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack
Mingli Zhu
Siyuan Liang
Baoyuan Wu
AAML
119
18
0
25 May 2024
Robust width: A lightweight and certifiable adversarial defense
Jonathan Peck
Bart Goossens
AAML
76
2
0
24 May 2024
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Marco Rando
Christian Scano
Lorenzo Rosasco
Fabio Roli
AAML
68
2
0
23 May 2024
1
2
3
4
...
10
11
12
Next