ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.03141
  4. Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

8 December 2017
Battista Biggio
Fabio Roli
    AAML
ArXivPDFHTML

Papers citing "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"

50 / 210 papers shown
Title
MAGIC: Mask-Guided Image Synthesis by Inverting a Quasi-Robust
  Classifier
MAGIC: Mask-Guided Image Synthesis by Inverting a Quasi-Robust Classifier
Mozhdeh Rouhsedaghat
Masoud Monajatipoor
C.-C. Jay Kuo
I. Masi
40
6
0
23 Sep 2022
A Black-Box Attack on Optical Character Recognition Systems
A Black-Box Attack on Optical Character Recognition Systems
Samet Bayram
Kenneth Barner
AAML
12
5
0
30 Aug 2022
Adversarial Robustness for Tabular Data through Cost and Utility
  Awareness
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
26
16
0
27 Aug 2022
SoK: Explainable Machine Learning for Computer Security Applications
SoK: Explainable Machine Learning for Computer Security Applications
A. Nadeem
D. Vos
Clinton Cao
Luca Pajola
Simon Dieck
Robert Baumgartner
S. Verwer
34
40
0
22 Aug 2022
Training-Time Attacks against k-Nearest Neighbors
Training-Time Attacks against k-Nearest Neighbors
Ara Vartanian
Will Rosenbaum
Scott Alfeld
14
1
0
15 Aug 2022
Quality Not Quantity: On the Interaction between Dataset Design and
  Robustness of CLIP
Quality Not Quantity: On the Interaction between Dataset Design and Robustness of CLIP
Thao Nguyen
Gabriel Ilharco
Mitchell Wortsman
Sewoong Oh
Ludwig Schmidt
CLIP
VLM
47
99
0
10 Aug 2022
Verifiable Encodings for Secure Homomorphic Analytics
Verifiable Encodings for Secure Homomorphic Analytics
Sylvain Chatel
Christian Knabenhans
Apostolos Pyrgelis
Carmela Troncoso
Jean-Pierre Hubaux
33
19
0
28 Jul 2022
Practical Attacks on Machine Learning: A Case Study on Adversarial
  Windows Malware
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Luca Demetrio
Battista Biggio
Fabio Roli
AAML
16
8
0
12 Jul 2022
Machine Learning Security in Industry: A Quantitative Survey
Machine Learning Security in Industry: A Quantitative Survey
Kathrin Grosse
L. Bieringer
Tarek R. Besold
Battista Biggio
Katharina Krombholz
37
32
0
11 Jul 2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial
  Examples
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
38
15
0
04 Jul 2022
Robustness Evaluation of Deep Unsupervised Learning Algorithms for
  Intrusion Detection Systems
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems
D'Jeff K. Nkashama
Ariana Soltani
Jean-Charles Verdier
Marc Frappier
Pierre-Marting Tardif
F. Kabanza
OOD
AAML
29
5
0
25 Jun 2022
Understanding the effect of sparsity on neural networks robustness
Understanding the effect of sparsity on neural networks robustness
Lukas Timpl
R. Entezari
Hanie Sedghi
Behnam Neyshabur
O. Saukh
41
12
0
22 Jun 2022
Adversarial Scrutiny of Evidentiary Statistical Software
Adversarial Scrutiny of Evidentiary Statistical Software
Rediet Abebe
Moritz Hardt
Angela Jin
John Miller
Ludwig Schmidt
Rebecca Wexler
36
5
0
19 Jun 2022
Detecting Adversarial Examples in Batches -- a geometrical approach
Detecting Adversarial Examples in Batches -- a geometrical approach
Danush Kumar Venkatesh
Peter Steinbach
AAML
11
2
0
17 Jun 2022
I Know What You Trained Last Summer: A Survey on Stealing Machine
  Learning Models and Defences
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
45
106
0
16 Jun 2022
Architectural Backdoors in Neural Networks
Architectural Backdoors in Neural Networks
Mikel Bober-Irizar
Ilia Shumailov
Yiren Zhao
Robert D. Mullins
Nicolas Papernot
AAML
18
23
0
15 Jun 2022
A temporal chrominance trigger for clean-label backdoor attack against
  anti-spoof rebroadcast detection
A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection
Wei Guo
B. Tondi
Mauro Barni
AAML
19
13
0
02 Jun 2022
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating
  Weather Conditions on the Camera Lens of Autonomous Systems
fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems
Alberto Marchisio
Giovanni Caramia
Maurizio Martina
Muhammad Shafique
AAML
33
8
0
27 May 2022
Sample Complexity Bounds for Robustly Learning Decision Lists against
  Evasion Attacks
Sample Complexity Bounds for Robustly Learning Decision Lists against Evasion Attacks
Pascale Gourdeau
Varun Kanade
Marta Z. Kwiatkowska
J. Worrell
AAML
15
5
0
12 May 2022
Backdooring Explainable Machine Learning
Backdooring Explainable Machine Learning
Maximilian Noppel
Lukas Peter
Christian Wressnegger
AAML
16
5
0
20 Apr 2022
Evaluating the Adversarial Robustness for Fourier Neural Operators
Evaluating the Adversarial Robustness for Fourier Neural Operators
Abolaji D. Adesoji
Pin-Yu Chen
AAML
30
1
0
08 Apr 2022
Measuring AI Systems Beyond Accuracy
Measuring AI Systems Beyond Accuracy
Violet Turri
R. Dzombak
Eric T. Heim
Nathan M. VanHoudnos
Jay Palat
Anusha Sinha
30
0
0
07 Apr 2022
Experimental quantum adversarial learning with programmable
  superconducting qubits
Experimental quantum adversarial learning with programmable superconducting qubits
W. Ren
Weikang Li
Shibo Xu
Ke Wang
Wenjie Jiang
...
Zhen Wang
Jacob Biamonte
Chao Song
D. Deng
H. Wang
AAML
36
89
0
04 Apr 2022
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike
Johannes Schneider
Giovanni Apruzzese
AAML
32
8
0
18 Mar 2022
Federated Learning for Privacy Preservation in Smart Healthcare Systems:
  A Comprehensive Survey
Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey
Mansoor Ali
F. Naeem
M. Tariq
Georges Kaddoum
32
119
0
18 Mar 2022
Energy-Latency Attacks via Sponge Poisoning
Energy-Latency Attacks via Sponge Poisoning
Antonio Emanuele Cinà
Ambra Demontis
Battista Biggio
Fabio Roli
Marcello Pelillo
SILM
50
29
0
14 Mar 2022
The Cross-evaluation of Machine Learning-based Network Intrusion
  Detection Systems
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
Giovanni Apruzzese
Luca Pajola
Mauro Conti
32
53
0
09 Mar 2022
Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning
Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning
Hao He
Kaiwen Zha
Dina Katabi
AAML
34
32
0
22 Feb 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
25
37
0
21 Feb 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection
Aqib Rashid
Jose Such
AAML
24
5
0
15 Feb 2022
Can Adversarial Training Be Manipulated By Non-Robust Features?
Can Adversarial Training Be Manipulated By Non-Robust Features?
Lue Tao
Lei Feng
Hongxin Wei
Jinfeng Yi
Sheng-Jun Huang
Songcan Chen
AAML
101
16
0
31 Jan 2022
GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection
GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection
Maged AbdelAty
Sandra Scott-Hayward
Roberto Doriguzzi-Corin
Domenico Siracusa
AAML
29
23
0
31 Jan 2022
Improving Robustness by Enhancing Weak Subnets
Improving Robustness by Enhancing Weak Subnets
Yong Guo
David Stutz
Bernt Schiele
AAML
27
15
0
30 Jan 2022
Security for Machine Learning-based Software Systems: a survey of
  threats, practices and challenges
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
Huaming Chen
Muhammad Ali Babar
AAML
37
21
0
12 Jan 2022
Application of Markov Structure of Genomes to Outlier Identification and
  Read Classification
Application of Markov Structure of Genomes to Outlier Identification and Read Classification
A. Karr
Jason Hauzel
A. Porter
M. Schaefer
14
3
0
24 Dec 2021
Poisoning Knowledge Graph Embeddings via Relation Inference Patterns
Poisoning Knowledge Graph Embeddings via Relation Inference Patterns
Peru Bhardwaj
John D. Kelleher
Luca Costabello
Declan O’Sullivan
139
20
0
11 Nov 2021
SUPER-Net: Trustworthy Medical Image Segmentation with Uncertainty
  Propagation in Encoder-Decoder Networks
SUPER-Net: Trustworthy Medical Image Segmentation with Uncertainty Propagation in Encoder-Decoder Networks
Giuseppina Carannante
Dimah Dera
Nidhal C.Bouaynaya
Hassan M. Fathallah-Shaykh
Ghulam Rasool
UQCV
AAML
OOD
27
6
0
10 Nov 2021
Confidential Machine Learning Computation in Untrusted Environments: A
  Systems Security Perspective
Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective
Kha Dinh Duy
Taehyun Noh
Siwon Huh
Hojoon Lee
56
9
0
05 Nov 2021
Adversarial Attacks on Knowledge Graph Embeddings via Instance
  Attribution Methods
Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods
Peru Bhardwaj
John D. Kelleher
Luca Costabello
Declan O’Sullivan
16
20
0
04 Nov 2021
Availability Attacks Create Shortcuts
Availability Attacks Create Shortcuts
Da Yu
Huishuai Zhang
Wei Chen
Jian Yin
Tie-Yan Liu
AAML
31
57
0
01 Nov 2021
Adversarial Attacks on Spiking Convolutional Neural Networks for
  Event-based Vision
Adversarial Attacks on Spiking Convolutional Neural Networks for Event-based Vision
Julian Buchel
Gregor Lenz
Yalun Hu
Sadique Sheik
M. Sorbaro
AAML
27
14
0
06 Oct 2021
Trustworthy AI and Robotics and the Implications for the AEC Industry: A
  Systematic Literature Review and Future Potentials
Trustworthy AI and Robotics and the Implications for the AEC Industry: A Systematic Literature Review and Future Potentials
Newsha Emaminejad
Reza Akhavian
28
48
0
27 Sep 2021
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
J. Breier
Xiaolu Hou
Martín Ochoa
Jesus Solano
SILM
AAML
39
8
0
23 Sep 2021
Adversarial Transfer Attacks With Unknown Data and Class Overlap
Adversarial Transfer Attacks With Unknown Data and Class Overlap
Luke E. Richards
A. Nguyen
Ryan Capps
Steven D. Forsythe
Cynthia Matuszek
Edward Raff
AAML
41
7
0
23 Sep 2021
Robust fine-tuning of zero-shot models
Robust fine-tuning of zero-shot models
Mitchell Wortsman
Gabriel Ilharco
Jong Wook Kim
Mike Li
Simon Kornblith
...
Raphael Gontijo-Lopes
Hannaneh Hajishirzi
Ali Farhadi
Hongseok Namkoong
Ludwig Schmidt
VLM
64
691
0
04 Sep 2021
Recent advances for quantum classifiers
Recent advances for quantum classifiers
Weikang Li
D. Deng
AAML
39
84
0
30 Aug 2021
Why Adversarial Reprogramming Works, When It Fails, and How to Tell the
  Difference
Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Yang Zheng
Xiaoyi Feng
Zhaoqiang Xia
Xiaoyue Jiang
Ambra Demontis
Maura Pintor
Battista Biggio
Fabio Roli
AAML
25
22
0
26 Aug 2021
The Devil is in the GAN: Backdoor Attacks and Defenses in Deep
  Generative Models
The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models
Ambrish Rawat
Killian Levacher
M. Sinn
AAML
30
11
0
03 Aug 2021
TEACHING -- Trustworthy autonomous cyber-physical applications through
  human-centred intelligence
TEACHING -- Trustworthy autonomous cyber-physical applications through human-centred intelligence
D. Bacciu
S. Akarmazyan
E. Armengaud
Manlio Bacco
George N. Bravos
...
Konstantinos Tserpes
Fulvio Tagliabo
Jakob Valtl
Iraklis Varlamis
O. Veledar
26
23
0
14 Jul 2021
Using BERT Encoding to Tackle the Mad-lib Attack in SMS Spam Detection
Using BERT Encoding to Tackle the Mad-lib Attack in SMS Spam Detection
S. R. Galeano
40
18
0
13 Jul 2021
Previous
12345
Next