ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.03141
  4. Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
v1v2 (latest)

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

8 December 2017
Battista Biggio
Fabio Roli
    AAML
ArXiv (abs)PDFHTML

Papers citing "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"

50 / 590 papers shown
Title
SLIFER: Investigating Performance and Robustness of Malware Detection
  Pipelines
SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines
Andrea Ponte
Dmitrijs Trizna
Christian Scano
Battista Biggio
Ivan Tesfai Ogbu
Fabio Roli
73
2
0
23 May 2024
DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural
  Networks
DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural Networks
Patrik Velcický
J. Breier
Mladen Kovacevic
Xiaolu Hou
AAML
83
1
0
22 May 2024
A Constraint-Enforcing Reward for Adversarial Attacks on Text
  Classifiers
A Constraint-Enforcing Reward for Adversarial Attacks on Text Classifiers
Tom Roth
Inigo Jauregi Unanue
A. Abuadbba
Massimo Piccardi
AAMLSILM
74
1
0
20 May 2024
Effective and Robust Adversarial Training against Data and Label
  Corruptions
Effective and Robust Adversarial Training against Data and Label Corruptions
Pengfei Zhang
Zi Huang
Xin-Shun Xu
Guangdong Bai
93
4
0
07 May 2024
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
M. Kozák
Christian Scano
Dmitrijs Trizna
Fabio Roli
AAML
113
0
0
04 May 2024
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
Antonio Emanuele Cinà
Jérôme Rony
Maura Pintor
Christian Scano
Ambra Demontis
Battista Biggio
Ismail Ben Ayed
Fabio Roli
ELMAAMLSILM
133
10
0
30 Apr 2024
MISLEAD: Manipulating Importance of Selected features for Learning
  Epsilon in Evasion Attack Deception
MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception
Vidit Khazanchi
Pavan Kulkarni
Yuvaraj Govindarajulu
Manojkumar Somabhai Parmar
AAML
60
1
0
24 Apr 2024
RedactBuster: Entity Type Recognition from Redacted Documents
RedactBuster: Entity Type Recognition from Redacted Documents
Mirco Beltrame
Mauro Conti
Pierpaolo Guglielmin
Francesco Marchiori
Gabriele Orazi
64
0
0
19 Apr 2024
PASA: Attack Agnostic Unsupervised Adversarial Detection using
  Prediction & Attribution Sensitivity Analysis
PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Dipkamal Bhusal
Md Tanvirul Alam
M. K. Veerabhadran
Michael Clifford
Sara Rampazzi
Nidhi Rastogi
AAML
95
1
0
12 Apr 2024
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding
  the Users' Perception of Adversarial Webpages
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages
Ying Yuan
Qingying Hao
Giovanni Apruzzese
Mauro Conti
Gang Wang
AAML
87
7
0
03 Apr 2024
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
AAML
204
222
0
02 Apr 2024
A Survey of Privacy-Preserving Model Explanations: Privacy Risks,
  Attacks, and Countermeasures
A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Thanh Tam Nguyen
T. T. Huynh
Zhao Ren
Thanh Toan Nguyen
Phi Le Nguyen
Hongzhi Yin
Quoc Viet Hung Nguyen
166
8
0
31 Mar 2024
Benchmarking the Robustness of Temporal Action Detection Models Against
  Temporal Corruptions
Benchmarking the Robustness of Temporal Action Detection Models Against Temporal Corruptions
Runhao Zeng
Xiaoyong Chen
Jiaming Liang
Huisi Wu
Guangzhong Cao
Yong Guo
AAML
95
4
0
29 Mar 2024
Bayesian Learned Models Can Detect Adversarial Malware For Free
Bayesian Learned Models Can Detect Adversarial Malware For Free
Bao Gia Doan
Dang Quang Nguyen
Paul Montague
Tamas Abraham
O. Vel
S. Çamtepe
S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
AAML
63
1
0
27 Mar 2024
Robust optimization for adversarial learning with finite sample
  complexity guarantees
Robust optimization for adversarial learning with finite sample complexity guarantees
André Bertolace
Konstatinos Gatsis
Kostas Margellos
AAML
64
1
0
22 Mar 2024
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer
  IoT Devices
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices
Xueshuo Xie
Haoxu Wang
Zhaolong Jian
Tao Li
Wei Wang
Zhiwei Xu
Gui-Ping Wang
66
3
0
19 Mar 2024
Problem space structural adversarial attacks for Network Intrusion
  Detection Systems based on Graph Neural Networks
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks
Andrea Venturi
Dario Stabili
Mirco Marchetti
AAML
69
1
0
18 Mar 2024
Introducing First-Principles Calculations: New Approach to Group
  Dynamics and Bridging Social Phenomena in TeNP-Chain Based Social Dynamics
  Simulations
Introducing First-Principles Calculations: New Approach to Group Dynamics and Bridging Social Phenomena in TeNP-Chain Based Social Dynamics Simulations
Yasuko Kawahata
129
0
0
06 Mar 2024
Note: Harnessing Tellurium Nanoparticles in the Digital Realm Plasmon
  Resonance, in the Context of Brewster's Angle and the Drude Model for Fake
  News Adsorption in Incomplete Information Games
Note: Harnessing Tellurium Nanoparticles in the Digital Realm Plasmon Resonance, in the Context of Brewster's Angle and the Drude Model for Fake News Adsorption in Incomplete Information Games
Yasuko Kawahata
102
0
0
05 Mar 2024
Plasmon Resonance Model: Investigation of Analysis of Fake News
  Diffusion Model with Third Mover Intervention Using Soliton Solution in
  Non-Complete Information Game under Repeated Dilemma Condition
Plasmon Resonance Model: Investigation of Analysis of Fake News Diffusion Model with Third Mover Intervention Using Soliton Solution in Non-Complete Information Game under Repeated Dilemma Condition
Yasuko Kawahata
125
0
0
03 Mar 2024
How to Train your Antivirus: RL-based Hardening through the
  Problem-Space
How to Train your Antivirus: RL-based Hardening through the Problem-Space
Jacopo Cortellazzi
Ilias Tsingenopoulos
B. Bosanský
Simone Aonzo
Davy Preuveneers
Wouter Joosen
Fabio Pierazzi
Lorenzo Cavallaro
64
2
0
29 Feb 2024
A Curious Case of Remarkable Resilience to Gradient Attacks via Fully
  Convolutional and Differentiable Front End with a Skip Connection
A Curious Case of Remarkable Resilience to Gradient Attacks via Fully Convolutional and Differentiable Front End with a Skip Connection
Leonid Boytsov
Ameya Joshi
Filipe Condessa
AAML
43
0
0
26 Feb 2024
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems
Jinjing Shi
Zimeng Xiao
Heyuan Shi
Yu Jiang
Xuelong Li
AAML
84
1
0
20 Feb 2024
Manipulating hidden-Markov-model inferences by corrupting batch data
Manipulating hidden-Markov-model inferences by corrupting batch data
William N. Caballero
Jose Manuel Camacho
Tahir Ekin
Roi Naveiro
AAML
52
1
0
19 Feb 2024
Entanglement: Balancing Punishment and Compensation, Repeated Dilemma
  Game-Theoretic Analysis of Maximum Compensation Problem for Bypass and Least
  Cost Paths in Fact-Checking, Case of Fake News with Weak Wallace's Law
Entanglement: Balancing Punishment and Compensation, Repeated Dilemma Game-Theoretic Analysis of Maximum Compensation Problem for Bypass and Least Cost Paths in Fact-Checking, Case of Fake News with Weak Wallace's Law
Yasuko Kawahata
118
0
0
18 Feb 2024
Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in
  Deep Learning
Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning
H. M. Dolatabadi
S. Erfani
Christopher Leckie
AAML
89
0
0
17 Feb 2024
The AI Security Pyramid of Pain
The AI Security Pyramid of Pain
Chris M. Ward
Joshua D. Harguess
Julia Tao
Daniel Christman
Paul Spicer
Mike Tan
29
3
0
16 Feb 2024
Camouflage is all you need: Evaluating and Enhancing Language Model
  Robustness Against Camouflage Adversarial Attacks
Camouflage is all you need: Evaluating and Enhancing Language Model Robustness Against Camouflage Adversarial Attacks
Álvaro Huertas-García
Alejandro Martín
Javier Huertas-Tato
David Camacho
AAML
71
0
0
15 Feb 2024
PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented
  Generation of Large Language Models
PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented Generation of Large Language Models
Wei Zou
Runpeng Geng
Binghui Wang
Jinyuan Jia
SILM
109
45
1
12 Feb 2024
Adversarial Robustness Through Artifact Design
Adversarial Robustness Through Artifact Design
Tsufit Shua
Mahmood Sharif
AAML
72
0
0
07 Feb 2024
Efficient Availability Attacks against Supervised and Contrastive
  Learning Simultaneously
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously
Yihan Wang
Yifan Zhu
Xiao-Shan Gao
AAML
93
6
0
06 Feb 2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)
Zeliang Kan
Shae McFadden
Daniel Arp
Feargus Pendlebury
Roberto Jordaney
Johannes Kinder
Fabio Pierazzi
Lorenzo Cavallaro
100
1
0
02 Feb 2024
Privacy and Security Implications of Cloud-Based AI Services : A Survey
Privacy and Security Implications of Cloud-Based AI Services : A Survey
Alka Luqman
Riya Mahesh
Anupam Chattopadhyay
57
2
0
31 Jan 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive
  Attackers for Security Applications
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
52
1
0
20 Jan 2024
AdvSQLi: Generating Adversarial SQL Injections against Real-world
  WAF-as-a-service
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service
Zhenqing Qu
Xiang Ling
Ting Wang
Xiang Chen
Shouling Ji
Chunming Wu
AAML
67
12
0
05 Jan 2024
Can you See me? On the Visibility of NOPs against Android Malware
  Detectors
Can you See me? On the Visibility of NOPs against Android Malware Detectors
Diego Soi
Davide Maiorca
Giorgio Giacinto
Harel Berger
AAML
25
0
0
28 Dec 2023
Radio Signal Classification by Adversarially Robust Quantum Machine
  Learning
Radio Signal Classification by Adversarially Robust Quantum Machine Learning
Yanqiu Wu
E. Adermann
Chandra Thapa
S. Çamtepe
Hajime Suzuki
Muhammad Usman
AAML
59
3
0
13 Dec 2023
Neither hype nor gloom do DNNs justice
Neither hype nor gloom do DNNs justice
Gaurav Malhotra
Christian Tsvetkov
B. D. Evans
86
125
0
08 Dec 2023
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using
  Adversarial Machine Learning
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning
Chen Doytshman
Satoru Momiyama
Inderjeet Singh
Yuval Elovici
A. Shabtai
31
1
0
02 Dec 2023
"Do Users fall for Real Adversarial Phishing?" Investigating the Human
  response to Evasive Webpages
"Do Users fall for Real Adversarial Phishing?" Investigating the Human response to Evasive Webpages
Ajka Draganovic
Savino Dambra
Javier Aldana-Iuit
Kevin A. Roundy
Giovanni Apruzzese
79
7
0
28 Nov 2023
The Anatomy Spread of Online Opinion Polarization: The Pivotal Role of
  Super-Spreaders in Social Networks
The Anatomy Spread of Online Opinion Polarization: The Pivotal Role of Super-Spreaders in Social Networks
Yasuko Kawahata
105
0
0
27 Nov 2023
Quantum Inception Score
Quantum Inception Score
Akira Sone
Akira Tanji
Naoki Yamamoto
69
2
0
20 Nov 2023
PACOL: Poisoning Attacks Against Continual Learners
PACOL: Poisoning Attacks Against Continual Learners
Huayu Li
G. Ditzler
AAML
58
3
0
18 Nov 2023
Towards more Practical Threat Models in Artificial Intelligence Security
Towards more Practical Threat Models in Artificial Intelligence Security
Kathrin Grosse
L. Bieringer
Tarek R. Besold
Alexandre Alahi
106
13
0
16 Nov 2023
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based
  Wireless Communication Systems
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems
Jung-Woo Chang
Ke Sun
Nasimeh Heydaribeni
Seira Hidano
Xinyu Zhang
F. Koushanfar
AAML
78
1
0
01 Nov 2023
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
Xinyu She
Yue Liu
Yanjie Zhao
Yiling He
Li Li
Chakkrit Tantithamthavorn
Zhan Qin
Haoyu Wang
ELM
99
14
0
27 Oct 2023
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks
Xinglong Chang
Katharina Dost
Gill Dobbie
Jörg Simon Wicker
AAML
60
0
0
24 Oct 2023
Specify Robust Causal Representation from Mixed Observations
Specify Robust Causal Representation from Mixed Observations
Mengyue Yang
Xin-Qiang Cai
Furui Liu
Weinan Zhang
Jun Wang
CMLOOD
111
7
0
21 Oct 2023
Malicious Agent Detection for Robust Multi-Agent Collaborative
  Perception
Malicious Agent Detection for Robust Multi-Agent Collaborative Perception
Yangheng Zhao
Zhen Xiang
Sheng Yin
Xianghe Pang
Siheng Chen
Yanfeng Wang
AAML
91
6
0
18 Oct 2023
Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural
  Networks
Samples on Thin Ice: Re-Evaluating Adversarial Pruning of Neural Networks
Giorgio Piras
Maura Pintor
Ambra Demontis
Battista Biggio
AAML
55
1
0
12 Oct 2023
Previous
12345...101112
Next