ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.03141
  4. Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
v1v2 (latest)

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

8 December 2017
Battista Biggio
Fabio Roli
    AAML
ArXiv (abs)PDFHTML

Papers citing "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"

40 / 590 papers shown
Title
Towards Adversarial Malware Detection: Lessons Learned from PDF-based
  Attacks
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
Davide Maiorca
Battista Biggio
Giorgio Giacinto
AAML
73
47
0
02 Nov 2018
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive
  Bayes Spam Filters
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters
David J. Miller
Xinyi Hu
Zhen Xiang
G. Kesidis
36
4
0
31 Oct 2018
Law and Adversarial Machine Learning
Law and Adversarial Machine Learning
Ramnath Kumar
David R. O'Brien
Kendra Albert
Salome Vilojen
AILawAAML
37
12
0
25 Oct 2018
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep
  Reinforcement Learning
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep Reinforcement Learning
Vahid Behzadan
Arslan Munir
80
27
0
23 Oct 2018
Average Margin Regularization for Classifiers
Average Margin Regularization for Classifiers
Matt Olfat
A. Aswani
OODAAML
23
1
0
09 Oct 2018
Adversarial Examples - A Complete Characterisation of the Phenomenon
Adversarial Examples - A Complete Characterisation of the Phenomenon
A. Serban
E. Poll
Joost Visser
SILMAAML
102
49
0
02 Oct 2018
A Kernel Perspective for Regularizing Deep Neural Networks
A Kernel Perspective for Regularizing Deep Neural Networks
A. Bietti
Grégoire Mialon
Dexiong Chen
Julien Mairal
82
15
0
30 Sep 2018
On The Utility of Conditional Generation Based Mutual Information for
  Characterizing Adversarial Subspaces
On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces
Chia-Yi Hsu
Pei-Hsuan Lu
Pin-Yu Chen
Chia-Mu Yu
AAML
70
1
0
24 Sep 2018
Is Ordered Weighted $\ell_1$ Regularized Regression Robust to
  Adversarial Perturbation? A Case Study on OSCAR
Is Ordered Weighted ℓ1\ell_1ℓ1​ Regularized Regression Robust to Adversarial Perturbation? A Case Study on OSCAR
Pin-Yu Chen
B. Vinzamuri
Sijia Liu
AAMLOOD
69
7
0
24 Sep 2018
Adversarial Binaries for Authorship Identification
Adversarial Binaries for Authorship Identification
Xiaozhu Meng
B. Miller
S. Jha
AAML
61
11
0
21 Sep 2018
Robustness Guarantees for Bayesian Inference with Gaussian Processes
Robustness Guarantees for Bayesian Inference with Gaussian Processes
L. Cardelli
Marta Kwiatkowska
Luca Laurenti
A. Patané
AAML
72
52
0
17 Sep 2018
Adversarial Examples: Opportunities and Challenges
Adversarial Examples: Opportunities and Challenges
Jiliang Zhang
Chen Li
AAML
57
234
0
13 Sep 2018
Humans can decipher adversarial images
Humans can decipher adversarial images
Zhenglong Zhou
C. Firestone
AAML
68
122
0
11 Sep 2018
Why Do Adversarial Attacks Transfer? Explaining Transferability of
  Evasion and Poisoning Attacks
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
SILMAAML
60
11
0
08 Sep 2018
Reinforcement Learning under Threats
Reinforcement Learning under Threats
Víctor Gallego
Roi Naveiro
D. Insua
AAML
80
26
0
05 Sep 2018
Adversarial Vision Challenge
Adversarial Vision Challenge
Wieland Brendel
Jonas Rauber
Alexey Kurakin
Nicolas Papernot
Behar Veliqi
M. Salathé
Sharada Mohanty
Matthias Bethge
AAML
79
58
0
06 Aug 2018
TESSERACT: Eliminating Experimental Bias in Malware Classification
  across Space and Time
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Feargus Pendlebury
Fabio Pierazzi
Roberto Jordaney
Johannes Kinder
Lorenzo Cavallaro
94
360
0
20 Jul 2018
Motivating the Rules of the Game for Adversarial Example Research
Motivating the Rules of the Game for Adversarial Example Research
Justin Gilmer
Ryan P. Adams
Ian Goodfellow
David G. Andersen
George E. Dahl
AAML
107
229
0
18 Jul 2018
Adaptive Adversarial Attack on Scene Text Recognition
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan
Pan He
Xiaolin Li
Dapeng Oliver Wu
AAML
73
23
0
09 Jul 2018
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
T. Tanay
Jerone T. A. Andrews
Lewis D. Griffin
73
7
0
19 Jun 2018
POTs: Protective Optimization Technologies
POTs: Protective Optimization Technologies
B. Kulynych
R. Overdorf
Carmela Troncoso
Seda F. Gürses
112
97
0
07 Jun 2018
PAC-learning in the presence of evasion adversaries
PAC-learning in the presence of evasion adversaries
Daniel Cullina
A. Bhagoji
Prateek Mittal
AAML
90
55
0
05 Jun 2018
Robustness May Be at Odds with Accuracy
Robustness May Be at Odds with Accuracy
Dimitris Tsipras
Shibani Santurkar
Logan Engstrom
Alexander Turner
Aleksander Madry
AAML
116
1,786
0
30 May 2018
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for
  Attacking Black-box Neural Networks
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Chun-Chen Tu
Pai-Shun Ting
Pin-Yu Chen
Sijia Liu
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Shin-Ming Cheng
MLAUAAML
94
399
0
30 May 2018
On the Effectiveness of System API-Related Information for Android
  Ransomware Detection
On the Effectiveness of System API-Related Information for Android Ransomware Detection
Michele Scalas
Davide Maiorca
F. Mercaldo
C. A. Visaggio
F. Martinelli
Giorgio Giacinto
AAML
33
77
0
24 May 2018
PRADA: Protecting against DNN Model Stealing Attacks
PRADA: Protecting against DNN Model Stealing Attacks
Mika Juuti
S. Szyller
Samuel Marchal
Nadarajah Asokan
SILMAAML
105
445
0
07 May 2018
Adversarially Robust Generalization Requires More Data
Adversarially Robust Generalization Requires More Data
Ludwig Schmidt
Shibani Santurkar
Dimitris Tsipras
Kunal Talwar
Aleksander Madry
OODAAML
202
797
0
30 Apr 2018
Adversarial Attacks Against Medical Deep Learning Systems
Adversarial Attacks Against Medical Deep Learning Systems
S. G. Finlayson
Hyung Won Chung
I. Kohane
Andrew L. Beam
SILMAAMLOODMedIm
85
232
0
15 Apr 2018
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for
  Regression Learning
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
Matthew Jagielski
Alina Oprea
Battista Biggio
Chang-rui Liu
Cristina Nita-Rotaru
Yue Liu
AAML
101
764
0
01 Apr 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware
  Detection in Executables
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
Bojan Kolosnjaji
Ambra Demontis
Battista Biggio
Davide Maiorca
Giorgio Giacinto
Claudia Eckert
Fabio Roli
AAML
70
318
0
12 Mar 2018
Explaining Black-box Android Malware Detection
Explaining Black-box Android Malware Detection
Marco Melis
Davide Maiorca
Battista Biggio
Giorgio Giacinto
Fabio Roli
AAMLFAtt
49
44
0
09 Mar 2018
The Hidden Vulnerability of Distributed Learning in Byzantium
The Hidden Vulnerability of Distributed Learning in Byzantium
El-Mahdi El-Mhamdi
R. Guerraoui
Sébastien Rouault
AAMLFedML
79
768
0
22 Feb 2018
Adversarial classification: An adversarial risk analysis approach
Adversarial classification: An adversarial risk analysis approach
Roi Naveiro
A. Redondo
D. Insua
Fabrizio Ruggeri
AAML
38
36
0
21 Feb 2018
Attack Strength vs. Detectability Dilemma in Adversarial Machine
  Learning
Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning
Christopher Frederickson
Michael Moore
Glenn Dawson
R. Polikar
AAML
62
33
0
20 Feb 2018
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Abdullah Al-Dujaili
Alex Huang
Erik Hemberg
Una-May O’Reilly
AAML
107
188
0
09 Jan 2018
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique
  Transferability Level for Logistic Regression
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression
Martin Gubri
AAML
15
0
0
06 Jan 2018
A General Framework for Adversarial Examples with Objectives
A General Framework for Adversarial Examples with Objectives
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
AAMLGAN
84
196
0
31 Dec 2017
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN
  Classifiers at Test Time
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time
David J. Miller
Yujia Wang
G. Kesidis
AAML
55
44
0
18 Dec 2017
Hardening Quantum Machine Learning Against Adversaries
Hardening Quantum Machine Learning Against Adversaries
N. Wiebe
Ramnath Kumar
AAML
68
20
0
17 Nov 2017
Adversarial Detection of Flash Malware: Limitations and Open Issues
Adversarial Detection of Flash Malware: Limitations and Open Issues
Davide Maiorca
Ambra Demontis
Battista Biggio
Maria Elena Chiappe
Giorgio Giacinto
AAML
41
24
0
27 Oct 2017
Previous
123...101112