ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1509.07892
  4. Cited By
Evasion and Hardening of Tree Ensemble Classifiers

Evasion and Hardening of Tree Ensemble Classifiers

25 September 2015
Alex Kantchelian
J. D. Tygar
A. Joseph
    AAML
ArXivPDFHTML

Papers citing "Evasion and Hardening of Tree Ensemble Classifiers"

22 / 22 papers shown
Title
Verifiable Boosted Tree Ensembles
Verifiable Boosted Tree Ensembles
Stefano Calzavara
Lorenzo Cazzaro
Claudio Lucchese
Giulio Ermanno Pibiri
AAML
40
0
0
22 Feb 2024
Robustness Verification for Knowledge-Based Logic of Risky Driving
  Scenes
Robustness Verification for Knowledge-Based Logic of Risky Driving Scenes
Xia Wang
Anda Liang
Jonathan Sprinkle
Taylor T. Johnson
13
4
0
27 Dec 2023
Towards Adversarial Realism and Robust Learning for IoT Intrusion
  Detection and Classification
Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification
João Vitorino
Isabel Praça
Eva Maia
AAML
26
28
0
30 Jan 2023
Explainable Global Fairness Verification of Tree-Based Classifiers
Explainable Global Fairness Verification of Tree-Based Classifiers
Stefano Calzavara
Lorenzo Cazzaro
Claudio Lucchese
Federico Marcuzzi
24
2
0
27 Sep 2022
Adversarial Robustness for Tabular Data through Cost and Utility
  Awareness
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev
B. Kulynych
Carmela Troncoso
AAML
18
16
0
27 Aug 2022
Provably Adversarially Robust Nearest Prototype Classifiers
Provably Adversarially Robust Nearest Prototype Classifiers
Václav Voráček
Matthias Hein
AAML
20
11
0
14 Jul 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
21
3
0
09 May 2022
Modeling Realistic Adversarial Attacks against Network Intrusion
  Detection Systems
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
Giovanni Apruzzese
M. Andreolini
Luca Ferretti
Mirco Marchetti
M. Colajanni
AAML
26
104
0
17 Jun 2021
A Review of Formal Methods applied to Machine Learning
A Review of Formal Methods applied to Machine Learning
Caterina Urban
Antoine Miné
24
55
0
06 Apr 2021
Connecting Interpretability and Robustness in Decision Trees through
  Separation
Connecting Interpretability and Robustness in Decision Trees through Separation
Michal Moshkovitz
Yao-Yuan Yang
Kamalika Chaudhuri
25
22
0
14 Feb 2021
Certifying Decision Trees Against Evasion Attacks by Program Analysis
Certifying Decision Trees Against Evasion Attacks by Program Analysis
Stefano Calzavara
Pietro Ferrara
Claudio Lucchese
AAML
11
10
0
06 Jul 2020
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Lu Wang
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
Yuan Jiang
AAML
24
12
0
11 May 2020
Complaint-driven Training Data Debugging for Query 2.0
Complaint-driven Training Data Debugging for Query 2.0
Weiyuan Wu
Lampros Flokas
Eugene Wu
Jiannan Wang
16
43
0
12 Apr 2020
Malware Makeover: Breaking ML-based Static Analysis by Modifying
  Executable Bytes
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
S. Shintre
AAML
23
64
0
19 Dec 2019
Provably Robust Boosted Decision Stumps and Trees against Adversarial
  Attacks
Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks
Maksym Andriushchenko
Matthias Hein
14
61
0
08 Jun 2019
Robustness for Non-Parametric Classification: A Generic Attack and
  Defense
Robustness for Non-Parametric Classification: A Generic Attack and Defense
Yao-Yuan Yang
Cyrus Rashtchian
Yizhen Wang
Kamalika Chaudhuri
SILM
AAML
24
42
0
07 Jun 2019
Enhancing Transformation-based Defenses using a Distribution Classifier
Enhancing Transformation-based Defenses using a Distribution Classifier
C. Kou
H. Lee
E. Chang
Teck Khim Ng
21
3
0
01 Jun 2019
Why Do Adversarial Attacks Transfer? Explaining Transferability of
  Evasion and Poisoning Attacks
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
SILM
AAML
11
11
0
08 Sep 2018
A General Framework for Adversarial Examples with Objectives
A General Framework for Adversarial Examples with Objectives
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
AAML
GAN
13
191
0
31 Dec 2017
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Battista Biggio
Fabio Roli
AAML
23
1,387
0
08 Dec 2017
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware
Davide Maiorca
Battista Biggio
12
36
0
17 Jul 2017
Limited-Memory Matrix Adaptation for Large Scale Black-box Optimization
Limited-Memory Matrix Adaptation for Large Scale Black-box Optimization
I. Loshchilov
Tobias Glasmachers
Hans-Georg Beyer
ODL
9
18
0
18 May 2017
1