منابع مشابه
Foundations of Adversarial Machine Learning
As classifiers are deployed to detect malicious behavior ranging from spam to terrorism, adversaries modify their behaviors to avoid detection (e.g., [4, 3, 6]). This makes the very behavior the classifier is trying to detect a function of the classifier itself. Learners that account for concept drift (e.g., [5]) are not sufficient since they do not allow the change in concept to depend on the ...
متن کاملAdversarial Machine Learning at Scale
Adversarial examples are malicious inputs designed to fool machine learning models. They often transfer from one model to another, allowing attackers to mount black box attacks without knowledge of the target model’s parameters. Adversarial training is the process of explicitly training a model on adversarial examples, in order to make it more robust to attack or to reduce its test error on cle...
متن کاملAdversarial and Secure Machine Learning
The advance of machine learning has enabled establishments of many automatic systems, leveraging its outstanding predictive power. From face recognition to recommendation systems and to social network relationship mining, machine learning found its rising attention from both researchers and practitioners in many different domains. Data-driven technologies based on machine learning facilitate th...
متن کاملCleverhans V0.1: an Adversarial Machine Learning Library
cleverhans is a software library that provides standardized reference implementations of adversarial example construction techniques and adversarial training. The library may be used to develop more robust machine learning models and to provide standardized benchmarks of models’ performance in the adversarial setting. Benchmarks constructed without a standardized implementation of adversarial e...
متن کاملMachine Learning for Adversarial Agent Microworlds
representations or ‘microworlds’ have been used throughout military history to aid in conceptualization and reasoning of terrain, force disposition and movements. With the introduction of digitized systems into military headquarters the capacity to degrade decision-making has become a concern with these representations. Maps with overlays are a centerpiece of most military headquarters and may ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet Computing
سال: 2011
ISSN: 1089-7801
DOI: 10.1109/mic.2011.112