Adversarial Machine Learning for Protecting Against Online Manipulation

نویسندگان

چکیده

Adversarial examples are inputs to a machine learning system that result in an incorrect output from system. Attacks launched through this type of input can cause severe consequences: for example, the field image recognition, stop signal be misclassified as speed limit indication. However, adversarial also represent fuel flurry research directions different domains and applications. Here, we give overview how they profitably exploited powerful tools build stronger models, capable better-withstanding attacks, two crucial tasks: fake news social bot detection.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting JPEG Images Against Adversarial Attacks

As deep neural networks (DNNs) have been integrated into critical systems, several methods to attack these systems have been developed. These adversarial attacks make imperceptible modifications to an image that fool DNN classifiers. We present an adaptive JPEG encoder which defends against many of these attacks. Experimentally, we show that our method produces images with high visual quality w...

متن کامل

Perturbation Algorithms for Adversarial Online Learning

Perturbation Algorithms for Adversarial Online Learning

متن کامل

Foundations of Adversarial Machine Learning

As classifiers are deployed to detect malicious behavior ranging from spam to terrorism, adversaries modify their behaviors to avoid detection (e.g., [4, 3, 6]). This makes the very behavior the classifier is trying to detect a function of the classifier itself. Learners that account for concept drift (e.g., [5]) are not sufficient since they do not allow the change in concept to depend on the ...

متن کامل

Machine Learning for Adversarial Agent Microworlds

representations or ‘microworlds’ have been used throughout military history to aid in conceptualization and reasoning of terrain, force disposition and movements. With the introduction of digitized systems into military headquarters the capacity to degrade decision-making has become a concern with these representations. Maps with overlays are a centerpiece of most military headquarters and may ...

متن کامل

Adversarial Machine Learning at Scale

Adversarial examples are malicious inputs designed to fool machine learning models. They often transfer from one model to another, allowing attackers to mount black box attacks without knowledge of the target model’s parameters. Adversarial training is the process of explicitly training a model on adversarial examples, in order to make it more robust to attack or to reduce its test error on cle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet Computing

سال: 2022

ISSN: ['1089-7801', '1941-0131']

DOI: https://doi.org/10.1109/mic.2021.3130380