ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1712.03141
  4. Cited By
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
v1v2 (latest)

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

8 December 2017
Battista Biggio
Fabio Roli
    AAML
ArXiv (abs)PDFHTML

Papers citing "Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning"

50 / 590 papers shown
Title
GReAT: A Graph Regularized Adversarial Training Method
GReAT: A Graph Regularized Adversarial Training Method
Samet Bayram
Kenneth Barner
OODAAML
63
1
0
09 Oct 2023
Adversarial Machine Learning for Social Good: Reframing the Adversary as
  an Ally
Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
Shawqi Al-Maliki
Adnan Qayyum
Hassan Ali
M. Abdallah
Junaid Qadir
D. Hoang
Dusit Niyato
Ala I. Al-Fuqaha
AAML
121
3
0
05 Oct 2023
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on
  Machine-Learning Phishing Webpage Detectors
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors
Giuseppe Floris
Christian Scano
Maura Pintor
Luca Demetrio
Davide Balzarotti
Battista Biggio
AAML
73
7
0
04 Oct 2023
Defending Against Authorship Identification Attacks
Defending Against Authorship Identification Attacks
Haining Wang
56
2
0
02 Oct 2023
Out-Of-Domain Unlabeled Data Improves Generalization
Out-Of-Domain Unlabeled Data Improves Generalization
Amir Saberi
Amir Najafi
Alireza Heidari
Mohammad Hosein Movasaghinia
Abolfazl Motahari
B. Khalaj
OOD
49
0
0
29 Sep 2023
When to Trust AI: Advances and Challenges for Certification of Neural
  Networks
When to Trust AI: Advances and Challenges for Certification of Neural Networks
Marta Kwiatkowska
Xiyue Zhang
AAML
186
9
0
20 Sep 2023
Adversarial Attacks Against Uncertainty Quantification
Adversarial Attacks Against Uncertainty Quantification
Emanuele Ledda
Daniele Angioni
Giorgio Piras
Giorgio Fumera
Battista Biggio
Fabio Roli
AAML
97
3
0
19 Sep 2023
Hardening RGB-D Object Recognition Systems against Adversarial Patch
  Attacks
Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Yang Zheng
Christian Scano
Antonio Emanuele Cinà
Xiaoyi Feng
Zhaoqiang Xia
Xiaoyue Jiang
Ambra Demontis
Battista Biggio
Fabio Roli
AAML
57
2
0
13 Sep 2023
The Adversarial Implications of Variable-Time Inference
The Adversarial Implications of Variable-Time Inference
Dudi Biton
Aditi Misra
Efrat Levy
J. Kotak
Ron Bitton
R. Schuster
Nicolas Papernot
Yuval Elovici
Ben Nassi
AAML
26
0
0
05 Sep 2023
Efficient Query-Based Attack against ML-Based Android Malware Detection
  under Zero Knowledge Setting
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting
Ping He
Yifan Xia
Xuhong Zhang
Shouling Ji
AAML
85
15
0
05 Sep 2023
The Promise and Peril of Artificial Intelligence -- Violet Teaming
  Offers a Balanced Path Forward
The Promise and Peril of Artificial Intelligence -- Violet Teaming Offers a Balanced Path Forward
A. Titus
Adam Russell
89
1
0
28 Aug 2023
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
HoSNN: Adversarially-Robust Homeostatic Spiking Neural Networks with Adaptive Firing Thresholds
Hejia Geng
Peng Li
AAML
144
3
0
20 Aug 2023
A Comparison of Adversarial Learning Techniques for Malware Detection
A Comparison of Adversarial Learning Techniques for Malware Detection
Pavla Louthánová
M. Kozák
M. Jureček
Mark Stamp
AAML
54
2
0
19 Aug 2023
Attacking logo-based phishing website detectors with adversarial
  perturbations
Attacking logo-based phishing website detectors with adversarial perturbations
Jehyun Lee
Zhe Xin
Melanie Ng Pei See
Kanav Sabharwal
Giovanni Apruzzese
D. Divakaran
AAML
89
8
0
18 Aug 2023
Data-Free Model Extraction Attacks in the Context of Object Detection
Data-Free Model Extraction Attacks in the Context of Object Detection
Harshit Shah
G. Aravindhan
Pavan Kulkarni
Yuvaraj Govidarajulu
Manojkumar Somabhai Parmar
MIACVAAML
74
4
0
09 Aug 2023
A reading survey on adversarial machine learning: Adversarial attacks
  and their understanding
A reading survey on adversarial machine learning: Adversarial attacks and their understanding
Shashank Kotyan
AAML
66
6
0
07 Aug 2023
On the Connection between Pre-training Data Diversity and Fine-tuning
  Robustness
On the Connection between Pre-training Data Diversity and Fine-tuning Robustness
Vivek Ramanujan
Thao Nguyen
Sewoong Oh
Ludwig Schmidt
Ali Farhadi
OOD
46
26
0
24 Jul 2023
Interpretability and Transparency-Driven Detection and Transformation of
  Textual Adversarial Examples (IT-DT)
Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)
Bushra Sabir
Muhammad Ali Babar
Sharif Abuadbba
SILM
74
10
0
03 Jul 2023
MLSMM: Machine Learning Security Maturity Model
MLSMM: Machine Learning Security Maturity Model
F. Jedrzejewski
D. Fucci
Oleksandr Adamov
59
0
0
28 Jun 2023
Adversarial Training for Graph Neural Networks: Pitfalls, Solutions, and
  New Directions
Adversarial Training for Graph Neural Networks: Pitfalls, Solutions, and New Directions
Lukas Gosch
Simon Geisler
Daniel Sturm
Bertrand Charpentier
Daniel Zügner
Stephan Günnemann
AAMLGNN
92
32
0
27 Jun 2023
The race to robustness: exploiting fragile models for urban camouflage
  and the imperative for machine learning security
The race to robustness: exploiting fragile models for urban camouflage and the imperative for machine learning security
Harriet Farlow
Matthew A. Garratt
G. Mount
T. Lynar
AAML
62
0
0
26 Jun 2023
Adversarial Robustness Certification for Bayesian Neural Networks
Adversarial Robustness Certification for Bayesian Neural Networks
Matthew Wicker
A. Patané
Luca Laurenti
Marta Z. Kwiatkowska
AAML
78
3
0
23 Jun 2023
Geometric Algorithms for $k$-NN Poisoning
Geometric Algorithms for kkk-NN Poisoning
Diego Ihara Centurion
Karine Chubarian
Bohan Fan
Francesco Sgherzi
Thiruvenkadam S Radhakrishnan
Anastasios Sidiropoulos
Angelo Straight
FedML
21
0
0
21 Jun 2023
BNN-DP: Robustness Certification of Bayesian Neural Networks via Dynamic
  Programming
BNN-DP: Robustness Certification of Bayesian Neural Networks via Dynamic Programming
Steven Adams
A. Patané
Morteza Lahijanian
Luca Laurenti
AAML
194
7
0
19 Jun 2023
You Don't Need Robust Machine Learning to Manage Adversarial Attack
  Risks
You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks
Edward Raff
M. Benaroch
Andrew L. Farris
AAML
66
2
0
16 Jun 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
134
8
0
14 Jun 2023
Area is all you need: repeatable elements make stronger adversarial
  attacks
Area is all you need: repeatable elements make stronger adversarial attacks
D. Niederhut
AAML
64
0
0
13 Jun 2023
Exploring Model Dynamics for Accumulative Poisoning Discovery
Exploring Model Dynamics for Accumulative Poisoning Discovery
Jianing Zhu
Xiawei Guo
Jiangchao Yao
Chao Du
Li He
Shuo Yuan
Tongliang Liu
Liang Wang
Bo Han
AAML
58
0
0
06 Jun 2023
Adversarial attacks and defenses in explainable artificial intelligence:
  A survey
Adversarial attacks and defenses in explainable artificial intelligence: A survey
Hubert Baniecki
P. Biecek
AAML
126
69
0
06 Jun 2023
Adversarial alignment: Breaking the trade-off between the strength of an
  attack and its relevance to human perception
Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception
Drew Linsley
Pinyuan Feng
Thibaut Boissin
A. Ashok
Thomas Fel
Stephanie Olaiya
Thomas Serre
AAML
78
6
0
05 Jun 2023
Learning under random distributional shifts
Learning under random distributional shifts
Kirk Bansak
E. Paulson
Dominik Rothenhäusler
OOD
48
4
0
05 Jun 2023
Adversarial Attack Based on Prediction-Correction
Adversarial Attack Based on Prediction-Correction
Chen Wan
Fangjun Huang
AAML
62
4
0
02 Jun 2023
Attacks on Online Learners: a Teacher-Student Analysis
Attacks on Online Learners: a Teacher-Student Analysis
R. Margiotta
Sebastian Goldt
G. Sanguinetti
AAML
75
1
0
18 May 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
109
24
0
11 May 2023
On the Security Risks of Knowledge Graph Reasoning
On the Security Risks of Knowledge Graph Reasoning
Zhaohan Xi
Tianyu Du
Changjiang Li
Ren Pang
S. Ji
Xiapu Luo
Xusheng Xiao
Fenglong Ma
Ting Wang
59
10
0
03 May 2023
Stratified Adversarial Robustness with Rejection
Stratified Adversarial Robustness with Rejection
Jiefeng Chen
Jayaram Raghuram
Jihye Choi
Xi Wu
Yingyu Liang
S. Jha
52
2
0
02 May 2023
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion
  Detection
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese
Pavel Laskov
J. Schneider
111
26
0
30 Apr 2023
Assessing Vulnerabilities of Adversarial Learning Algorithm through
  Poisoning Attacks
Assessing Vulnerabilities of Adversarial Learning Algorithm through Poisoning Attacks
Jingfeng Zhang
Bo Song
Bo Han
Lei Liu
Gang Niu
Masashi Sugiyama
AAML
77
2
0
30 Apr 2023
On the existence of solutions to adversarial training in multiclass
  classification
On the existence of solutions to adversarial training in multiclass classification
Nicolas García Trillos
Matt Jacobs
Jakwang Kim
55
8
0
28 Apr 2023
Understanding Overfitting in Adversarial Training via Kernel Regression
Understanding Overfitting in Adversarial Training via Kernel Regression
Teng Zhang
Kang Li
56
2
0
13 Apr 2023
Improving the Transferability of Adversarial Samples by Path-Augmented
  Method
Improving the Transferability of Adversarial Samples by Path-Augmented Method
Jianping Zhang
Jen-tse Huang
Wenxuan Wang
Yichen Li
Weibin Wu
Xiaosen Wang
Yuxin Su
Michael R. Lyu
AAML
109
52
0
28 Mar 2023
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment
  using Adversarial Learning
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Thorsten Eisenhofer
Erwin Quiring
Jonas Moller
Doreen Riepel
Thorsten Holz
Konrad Rieck
AAML
59
6
0
25 Mar 2023
Adversarial Attacks against Binary Similarity Systems
Adversarial Attacks against Binary Similarity Systems
Gianluca Capozzi
Daniele Cono DÉlia
Giuseppe Antonio Di Luna
Leonardo Querzoni
AAML
58
2
0
20 Mar 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial
  Robustness
It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILMAAML
98
11
0
17 Mar 2023
The Devil's Advocate: Shattering the Illusion of Unexploitable Data
  using Diffusion Models
The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
H. M. Dolatabadi
S. Erfani
C. Leckie
DiffM
119
19
0
15 Mar 2023
Use Perturbations when Learning from Explanations
Use Perturbations when Learning from Explanations
Juyeon Heo
Vihari Piratla
Matthew Wicker
Adrian Weller
AAML
64
1
0
11 Mar 2023
Visual Analytics of Neuron Vulnerability to Adversarial Attacks on
  Convolutional Neural Networks
Visual Analytics of Neuron Vulnerability to Adversarial Attacks on Convolutional Neural Networks
Yiran Li
Junpeng Wang
Takanori Fujiwara
Kwan-Liu Ma
AAML
34
6
0
06 Mar 2023
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Single Image Backdoor Inversion via Robust Smoothed Classifiers
Mingjie Sun
Zico Kolter
AAML
64
13
0
01 Mar 2023
Measuring Equality in Machine Learning Security Defenses: A Case Study
  in Speech Recognition
Measuring Equality in Machine Learning Security Defenses: A Case Study in Speech Recognition
Luke E. Richards
Edward Raff
Cynthia Matuszek
AAML
102
2
0
17 Feb 2023
Black Box Adversarial Prompting for Foundation Models
Black Box Adversarial Prompting for Foundation Models
Natalie Maus
Patrick Chao
Eric Wong
Jacob R. Gardner
VLM
85
60
0
08 Feb 2023
Previous
123456...101112
Next