敵対的攻撃

GANG-MAM: GAN based enGine for Modifying Android Malware

Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27
ソフトウェアセキュリティ
マルウェア検出手法
敵対的攻撃

Adversarial Transfer Attacks With Unknown Data and Class Overlap

Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24
ポイズニング
ロバスト性
敵対的攻撃

Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability

Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21
マルウェア検出手法
敵対的サンプル
敵対的攻撃

Towards Resilient Artificial Intelligence: Survey and Research Issues

Authors: Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo | Published: 2021-09-18
ロバスト性
将来の研究
敵対的攻撃

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06
データ生成
性能評価
敵対的攻撃

Dodging Attack Using Carefully Crafted Natural Makeup

Authors: Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici | Published: 2021-09-14
メイクアップ攻撃
敵対的攻撃
顔認識システム

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06
バックドア攻撃
敵対的攻撃
音声認識システムのセキュリティ

When and How to Fool Explainable Models (and Humans) with Adversarial Examples

Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2021-07-05 | Updated: 2023-07-07
モデルの解釈性
敵対的サンプル
敵対的攻撃

Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks

Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30
データ汚染検出
敵対的攻撃
脆弱性評価手法

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30
ポイズニング
敵対的攻撃
脆弱性評価手法