ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1708.08327
  4. Cited By
Improving Robustness of ML Classifiers against Realizable Evasion
  Attacks Using Conserved Features
v1v2v3v4v5 (latest)

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features

28 August 2017
Liang Tong
Yue Liu
Chen Hajaj
Chaowei Xiao
Ning Zhang
Yevgeniy Vorobeychik
    AAMLOOD
ArXiv (abs)PDFHTML

Papers citing "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features"

36 / 36 papers shown
Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model
Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model
Side Liu
Jiang Ming
Guodong Zhou
Xinyi Liu
Jianming Fu
Guojun Peng
AAML
253
1
0
20 Jun 2025
Counteracting Concept Drift by Learning with Future Malware Predictions
Counteracting Concept Drift by Learning with Future Malware Predictions
B. Bosanský
Lada Hospodkova
Michal Najman
M. Rigaki
E. Babayeva
Viliam Lisý
AAML
133
2
0
14 Apr 2024
Preference Poisoning Attacks on Reward Model Learning
Preference Poisoning Attacks on Reward Model Learning
Junlin Wu
Zhenghao Hu
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
AAML
275
11
0
02 Feb 2024
Open Image Content Disarm And Reconstruction
Open Image Content Disarm And Reconstruction
Eli Belkind
Ran Dubin
A. Dvir
112
5
0
26 Jul 2023
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion
  Detection
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion DetectionEuropean Symposium on Security and Privacy (Euro S&P), 2023
Giovanni Apruzzese
Pavel Laskov
J. Schneider
252
42
0
30 Apr 2023
It Is All About Data: A Survey on the Effects of Data on Adversarial
  Robustness
It Is All About Data: A Survey on the Effects of Data on Adversarial RobustnessACM Computing Surveys (ACM Comput. Surv.), 2023
Peiyu Xiong
Michael W. Tegegn
Jaskeerat Singh Sarin
Shubhraneel Pal
Julia Rubin
SILMAAML
370
16
0
17 Mar 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
296
106
0
29 Dec 2022
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks
  against Phishing Website Detectors using Machine Learning
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine LearningAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Ying Yuan
Giovanni Apruzzese
Mauro Conti
AAML
335
27
0
24 Oct 2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial
  Examples
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial ExamplesIEEE Transactions on Network and Service Management (IEEE TNSM), 2022
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
238
18
0
04 Jul 2022
Robust Deep Reinforcement Learning through Bootstrapped Opportunistic
  Curriculum
Robust Deep Reinforcement Learning through Bootstrapped Opportunistic CurriculumInternational Conference on Machine Learning (ICML), 2022
Junlin Wu
Yevgeniy Vorobeychik
241
25
0
21 Jun 2022
Problem-Space Evasion Attacks in the Android OS: a Survey
Problem-Space Evasion Attacks in the Android OS: a Survey
Harel Berger
Chen Hajaj
A. Dvir
274
2
0
29 May 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
202
3
0
09 May 2022
MaMaDroid2.0 -- The Holes of Control Flow Graphs
MaMaDroid2.0 -- The Holes of Control Flow Graphs
Harel Berger
Chen Hajaj
Enrico Mariconti
A. Dvir
174
4
0
28 Feb 2022
Trustworthy AI: From Principles to Practices
Trustworthy AI: From Principles to Practices
Yue Liu
Peng Qi
Bo Liu
Shuai Di
Jingen Liu
Jiquan Pei
Jinfeng Yi
Bowen Zhou
471
513
0
04 Oct 2021
Attacks on Visualization-Based Malware Detection: Balancing
  Effectiveness and Executability
Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability
Hadjer Benkraouda
J. Qian
Hung Quoc Tran
Berkay Kaplan
AAML
79
6
0
21 Sep 2021
On the Exploitability of Audio Machine Learning Pipelines to
  Surreptitious Adversarial Examples
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Adelin Travers
Lorna Licollari
Guanghan Wang
Varun Chandrasekaran
Adam Dziedzic
David Lie
Nicolas Papernot
AAML
195
3
0
03 Aug 2021
Enhancing Robustness of Neural Networks through Fourier Stabilization
Enhancing Robustness of Neural Networks through Fourier StabilizationInternational Conference on Machine Learning (ICML), 2021
Netanel Raviv
Aidan Kelley
Michael M. Guo
Yevgeny Vorobeychik
AAML
64
13
0
08 Jun 2021
Adversarial Robustness with Non-uniform Perturbations
Adversarial Robustness with Non-uniform PerturbationsNeural Information Processing Systems (NeurIPS), 2021
Ece Naz Erdemir
Jeffrey Bickford
Luca Melis
Sergul Aydore
AAML
271
32
0
24 Feb 2021
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Oriole: Thwarting Privacy against Trustworthy Deep Learning ModelsAustralasian Conference on Information Security and Privacy (ACISP), 2021
Liuqiao Chen
Hu Wang
Benjamin Zi Hao Zhao
Minhui Xue
Hai-feng Qian
PICV
105
4
0
23 Feb 2021
Robusta: Robust AutoML for Feature Selection via Reinforcement Learning
Robusta: Robust AutoML for Feature Selection via Reinforcement Learning
Hadjer Benkraouda
Yue Liu
Yibo Jacky Zhang
B. Kailkhura
Klara Nahrstedt
87
3
0
15 Jan 2021
Incentivizing Truthfulness Through Audits in Strategic Classification
Incentivizing Truthfulness Through Audits in Strategic ClassificationAAAI Conference on Artificial Intelligence (AAAI), 2020
Andrew Estornell
Sanmay Das
Yevgeniy Vorobeychik
MLAU
73
10
0
16 Dec 2020
FaceLeaks: Inference Attacks against Transfer Learning Models via
  Black-box Queries
FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries
Seng Pei Liew
Tsubasa Takahashi
MIACVFedML
173
10
0
27 Oct 2020
Transcending Transcend: Revisiting Malware Classification in the
  Presence of Concept Drift
Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift
Federico Barbero
Feargus Pendlebury
Fabio Pierazzi
Lorenzo Cavallaro
372
106
0
08 Oct 2020
Less is More: Robust and Novel Features for Malicious Domain Detection
Less is More: Robust and Novel Features for Malicious Domain Detection
Chen Hajaj
Nitay Hason
Nissim Harel
A. Dvir
AAML
125
23
0
02 Jun 2020
Arms Race in Adversarial Malware Detection: A Survey
Arms Race in Adversarial Malware Detection: A Survey
Deqiang Li
Qianmu Li
Yanfang Ye
Shouhuai Xu
AAML
269
55
0
24 May 2020
When the Guard failed the Droid: A case study of Android malware
When the Guard failed the Droid: A case study of Android malware
Harel Berger
Chen Hajaj
A. Dvir
AAML
94
7
0
31 Mar 2020
Functionality-preserving Black-box Optimization of Adversarial Windows
  Malware
Functionality-preserving Black-box Optimization of Adversarial Windows MalwareIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2020
Christian Scano
Battista Biggio
Giovanni Lagorio
Fabio Roli
A. Armando
AAML
220
161
0
30 Mar 2020
TSS: Transformation-Specific Smoothing for Robustness Certification
TSS: Transformation-Specific Smoothing for Robustness CertificationConference on Computer and Communications Security (CCS), 2020
Linyi Li
Maurice Weber
Xiaojun Xu
Luka Rimanic
B. Kailkhura
Tao Xie
Ce Zhang
Yue Liu
AAML
436
61
0
27 Feb 2020
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
The Naked Sun: Malicious Cooperation Between Benign-Looking ProcessesInternational Conference on Applied Cryptography and Network Security (ACNS), 2019
Fabio De Gaspari
Dorjan Hitaj
Giulio Pagnotta
Lorenzo De Carli
L. Mancini
AAML
152
34
0
06 Nov 2019
Intriguing Properties of Adversarial ML Attacks in the Problem Space
  [Extended Version]
Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]ACM Transactions on Privacy and Security (TOPS), 2019
Jacopo Cortellazzi
Feargus Pendlebury
Daniel Arp
Erwin Quiring
Fabio Pierazzi
Lorenzo Cavallaro
AAML
320
3
0
05 Nov 2019
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained EnvironmentsACM Transactions on Privacy and Security (TOPS), 2019
Alesia Chernikova
Alina Oprea
AAML
449
48
0
23 Sep 2019
Defending Against Physically Realizable Attacks on Image Classification
Defending Against Physically Realizable Attacks on Image ClassificationInternational Conference on Learning Representations (ICLR), 2019
Tong Wu
Liang Tong
Yevgeniy Vorobeychik
AAML
263
141
0
20 Sep 2019
SemanticAdv: Generating Adversarial Examples via Attribute-conditional
  Image Editing
SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image EditingEuropean Conference on Computer Vision (ECCV), 2019
Haonan Qiu
Chaowei Xiao
Lei Yang
Xinchen Yan
Honglak Lee
Yue Liu
AAML
335
196
0
19 Jun 2019
Rearchitecting Classification Frameworks For Increased Robustness
Rearchitecting Classification Frameworks For Increased Robustness
Varun Chandrasekaran
Brian Tang
Nicolas Papernot
Kassem Fawaz
S. Jha
Xi Wu
AAMLOOD
289
8
0
26 May 2019
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot
  Detection
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection
S. Cresci
M. Petrocchi
A. Spognardi
Stefano Tognazzi
AAML
138
69
0
10 Apr 2019
On Training Robust PDF Malware Classifiers
On Training Robust PDF Malware Classifiers
Yizheng Chen
Shiqi Wang
Dongdong She
Suman Jana
AAML
202
75
0
06 Apr 2019
1