ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2002.05646
  4. Cited By
Adversarial Machine Learning -- Industry Perspectives
v1v2v3 (latest)

Adversarial Machine Learning -- Industry Perspectives

4 February 2020
Ramnath Kumar
Magnus Nyström
J. Lambert
Andrew Marshall
Mario Goertzel
Andi Comissoneru
Matt Swann
Sharon Xia
    AAMLSILM
ArXiv (abs)PDFHTML

Papers citing "Adversarial Machine Learning -- Industry Perspectives"

50 / 129 papers shown
Title
The race to robustness: exploiting fragile models for urban camouflage
  and the imperative for machine learning security
The race to robustness: exploiting fragile models for urban camouflage and the imperative for machine learning security
Harriet Farlow
Matthew A. Garratt
G. Mount
T. Lynar
AAML
130
1
0
26 Jun 2023
You Don't Need Robust Machine Learning to Manage Adversarial Attack
  Risks
You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks
Edward Raff
M. Benaroch
Andrew L. Farris
AAML
144
4
0
16 Jun 2023
Exploring Model Dynamics for Accumulative Poisoning Discovery
Exploring Model Dynamics for Accumulative Poisoning DiscoveryInternational Conference on Machine Learning (ICML), 2023
Jianing Zhu
Xiawei Guo
Jiangchao Yao
Chao Du
Li He
Shuo Yuan
Tongliang Liu
Liang Wang
Bo Han
AAML
120
0
0
06 Jun 2023
Poisoning Network Flow Classifiers
Poisoning Network Flow ClassifiersAsia-Pacific Computer Systems Architecture Conference (ACSA), 2023
Giorgio Severi
Simona Boboila
Alina Oprea
J. Holodnak
K. Kratkiewicz
J. Matterer
AAML
160
5
0
02 Jun 2023
A Symbolic Framework for Evaluating Mathematical Reasoning and
  Generalisation with Transformers
A Symbolic Framework for Evaluating Mathematical Reasoning and Generalisation with TransformersNorth American Chapter of the Association for Computational Linguistics (NAACL), 2023
Jordan Meadows
Marco Valentino
Damien Teney
André Freitas
202
12
0
21 May 2023
Trustworthy, responsible, ethical AI in manufacturing and supply chains:
  synthesis and emerging research questions
Trustworthy, responsible, ethical AI in manufacturing and supply chains: synthesis and emerging research questions
Alexandra Brintrup
George Baryannis
Ashutosh Tiwari
S. Ratchev
Giovanna Martínez-Arellano
Jatinder Singh
197
8
0
19 May 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible TriggerIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
288
34
0
11 May 2023
Pick your Poison: Undetectability versus Robustness in Data Poisoning
  Attacks
Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks
Nils Lukas
Florian Kerschbaum
219
1
0
07 May 2023
A Meta-Summary of Challenges in Building Products with ML Components --
  Collecting Experiences from 4758+ Practitioners
A Meta-Summary of Challenges in Building Products with ML Components -- Collecting Experiences from 4758+ Practitioners
Nadia Nahar
Haoran Zhang
Grace A. Lewis
Shurui Zhou
Jane Hsieh
317
53
0
31 Mar 2023
A Survey on Malware Detection with Graph Representation Learning
A Survey on Malware Detection with Graph Representation LearningACM Computing Surveys (ACM Comput. Surv.), 2023
Tristan Bilot
Nour El Madhoun
Khaldoun Al Agha
Anis Zouaoui
AAML
247
50
0
28 Mar 2023
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning
  Attacks
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning AttacksInternational Conference on Machine Learning (ICML), 2023
Yiwei Lu
Gautam Kamath
Yaoliang Yu
AAML
187
23
0
07 Mar 2023
Adversarial Sampling for Fairness Testing in Deep Neural Network
Adversarial Sampling for Fairness Testing in Deep Neural NetworkInternational Journal of Advanced Computer Science and Applications (IJACSA), 2023
Tosin Ige
William Marfo
Justin Tonkinson
Sikiru Adewale
Bolanle Hafiz Matti
OOD
123
10
0
06 Mar 2023
Analyzing And Editing Inner Mechanisms Of Backdoored Language Models
Analyzing And Editing Inner Mechanisms Of Backdoored Language ModelsConference on Fairness, Accountability and Transparency (FAccT), 2023
Max Lamparth
Anka Reuel
KELM
184
15
0
24 Feb 2023
Backdoor Learning for NLP: Recent Advances, Challenges, and Future
  Research Directions
Backdoor Learning for NLP: Recent Advances, Challenges, and Future Research Directions
Marwan Omar
SILMAAML
187
21
0
14 Feb 2023
Mithridates: Auditing and Boosting Backdoor Resistance of Machine
  Learning Pipelines
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning PipelinesConference on Computer and Communications Security (CCS), 2023
Eugene Bagdasaryan
Vitaly Shmatikov
AAML
271
3
0
09 Feb 2023
Towards Modelling and Verification of Social Explainable AI
Towards Modelling and Verification of Social Explainable AIInternational Conference on Agents and Artificial Intelligence (ICAART), 2023
Damian Kurpiewski
W. Jamroga
Teofil Sidoruk
AAML
149
4
0
02 Feb 2023
Model Monitoring and Robustness of In-Use Machine Learning Models:
  Quantifying Data Distribution Shifts Using Population Stability Index
Model Monitoring and Robustness of In-Use Machine Learning Models: Quantifying Data Distribution Shifts Using Population Stability Index
A. Khademi
M. Hopka
Devesh Upadhyay
OOD
187
4
0
01 Feb 2023
Towards Understanding How Self-training Tolerates Data Backdoor
  Poisoning
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Soumyadeep Pal
Ren Wang
Yuguang Yao
Sijia Liu
187
7
0
20 Jan 2023
SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent
  Reinforcement Learning
SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning
Maxwell Standen
Junae Kim
Claudia Szabo
AAML
208
6
0
11 Jan 2023
AI Maintenance: A Robustness Perspective
AI Maintenance: A Robustness PerspectiveComputer (IEEE Computer), 2023
Pin-Yu Chen
Payel Das
289
18
0
08 Jan 2023
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models
TrojanPuzzle: Covertly Poisoning Code-Suggestion ModelsIEEE Symposium on Security and Privacy (IEEE S&P), 2023
H. Aghakhani
Wei Dai
Andre Manoel
Xavier Fernandes
Anant Kharkar
Christopher Kruegel
Giovanni Vigna
David Evans
B. Zorn
Robert Sim
SILM
183
58
0
06 Jan 2023
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
244
105
0
29 Dec 2022
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks
  against Phishing Website Detectors using Machine Learning
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine LearningAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Ying Yuan
Giovanni Apruzzese
Mauro Conti
AAML
294
27
0
24 Oct 2022
Cybersecurity in the Smart Grid: Practitioners' Perspective
Cybersecurity in the Smart Grid: Practitioners' Perspective
Jacqueline Meyer
Giovanni Apruzzese
188
5
0
24 Oct 2022
Ares: A System-Oriented Wargame Framework for Adversarial ML
Ares: A System-Oriented Wargame Framework for Adversarial ML
Farhan Ahmed
Pratik Vaishnavi
Kevin Eykholt
Amir Rahmati
AAML
157
8
0
24 Oct 2022
How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?
How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?USENIX Security Symposium (USENIX Security), 2022
Yi Zeng
Minzhou Pan
Himanshu Jahagirdar
Ming Jin
Lingjuan Lyu
R. Jia
AAML
161
22
0
12 Oct 2022
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for
  Electric Vehicle CAN data
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data
Chathurika S. Wickramasinghe
Daniel L. Marino
Harindra S. Mavikumbure
Victor Cobilean
Timothy D. Pennington
Benny J. Varghese
C. Rieger
Milos Manic
AAML
113
21
0
05 Sep 2022
Reducing Certified Regression to Certified Classification for General
  Poisoning Attacks
Reducing Certified Regression to Certified Classification for General Poisoning Attacks
Zayd Hammoudeh
Daniel Lowd
AAML
206
12
0
29 Aug 2022
Friendly Noise against Adversarial Noise: A Powerful Defense against
  Data Poisoning Attacks
Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning AttacksNeural Information Processing Systems (NeurIPS), 2022
Tianwei Liu
Yu Yang
Baharan Mirzasoleiman
AAML
246
37
0
14 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
144
25
0
12 Jul 2022
Machine Learning Security in Industry: A Quantitative Survey
Machine Learning Security in Industry: A Quantitative SurveyIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Kathrin Grosse
L. Bieringer
Tarek R. Besold
Battista Biggio
Katharina Krombholz
234
46
0
11 Jul 2022
Threat Assessment in Machine Learning based Systems
Threat Assessment in Machine Learning based Systems
L. Tidjon
Foutse Khomh
130
19
0
30 Jun 2022
The Role of Machine Learning in Cybersecurity
The Role of Machine Learning in Cybersecurity
Giovanni Apruzzese
Pavel Laskov
Edgardo Montes de Oca
Wissam Mallouli
Luis Brdalo Rapa
A. Grammatopoulos
Fabio Di Franco
202
185
0
20 Jun 2022
A Unified Evaluation of Textual Backdoor Learning: Frameworks and
  Benchmarks
A Unified Evaluation of Textual Backdoor Learning: Frameworks and BenchmarksNeural Information Processing Systems (NeurIPS), 2022
Ganqu Cui
Lifan Yuan
Bingxiang He
Yangyi Chen
Zhiyuan Liu
Maosong Sun
AAMLELMSILM
245
93
0
17 Jun 2022
On the Permanence of Backdoors in Evolving Models
On the Permanence of Backdoors in Evolving Models
Huiying Li
A. Bhagoji
Yuxin Chen
Haitao Zheng
Ben Y. Zhao
AAML
229
3
0
08 Jun 2022
Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning
Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning
Yinglun Xu
Qi Zeng
Gagandeep Singh
AAML
264
8
0
30 May 2022
Indiscriminate Data Poisoning Attacks on Neural Networks
Indiscriminate Data Poisoning Attacks on Neural Networks
Yiwei Lu
Gautam Kamath
Yaoliang Yu
AAML
232
30
0
19 Apr 2022
Disappeared Command: Spoofing Attack On Automatic Speech Recognition
  Systems with Sound Masking
Disappeared Command: Spoofing Attack On Automatic Speech Recognition Systems with Sound Masking
Jinghui Xu
Jifeng Zhu
Yong-Liang Yang
157
1
0
19 Apr 2022
Machine Learning Security against Data Poisoning: Are We There Yet?
Machine Learning Security against Data Poisoning: Are We There Yet?
Antonio Emanuele Cinà
Kathrin Grosse
Ambra Demontis
Battista Biggio
Fabio Roli
Marcello Pelillo
AAML
139
49
0
12 Apr 2022
COPA: Certifying Robust Policies for Offline Reinforcement Learning
  against Poisoning Attacks
COPA: Certifying Robust Policies for Offline Reinforcement Learning against Poisoning AttacksInternational Conference on Learning Representations (ICLR), 2022
Fan Wu
Linyi Li
Chejian Xu
Huan Zhang
B. Kailkhura
K. Kenthapadi
Ding Zhao
Yue Liu
AAMLOffRL
154
39
0
16 Mar 2022
Energy-Latency Attacks via Sponge Poisoning
Energy-Latency Attacks via Sponge PoisoningInformation Sciences (Inf. Sci.), 2022
Antonio Emanuele Cinà
Ambra Demontis
Battista Biggio
Fabio Roli
Marcello Pelillo
SILM
469
33
0
14 Mar 2022
Towards a Responsible AI Development Lifecycle: Lessons From Information
  Security
Towards a Responsible AI Development Lifecycle: Lessons From Information Security
Erick Galinkin
SILM
132
6
0
06 Mar 2022
An Equivalence Between Data Poisoning and Byzantine Gradient Attacks
An Equivalence Between Data Poisoning and Byzantine Gradient AttacksInternational Conference on Machine Learning (ICML), 2022
Sadegh Farhadkhani
R. Guerraoui
L. Hoang
Oscar Villemaud
FedML
178
28
0
17 Feb 2022
Holistic Adversarial Robustness of Deep Learning Models
Holistic Adversarial Robustness of Deep Learning ModelsAAAI Conference on Artificial Intelligence (AAAI), 2022
Pin-Yu Chen
Sijia Liu
AAML
317
22
0
15 Feb 2022
DeepStability: A Study of Unstable Numerical Methods and Their Solutions
  in Deep Learning
DeepStability: A Study of Unstable Numerical Methods and Their Solutions in Deep LearningInternational Conference on Software Engineering (ICSE), 2022
Eliska Kloberdanz
Kyle G. Kloberdanz
Wei Le
167
20
0
07 Feb 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its ApplicationsAPSIPA Transactions on Signal and Information Processing (TASIP), 2022
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
171
63
0
26 Jan 2022
Identifying a Training-Set Attack's Target Using Renormalized Influence
  Estimation
Identifying a Training-Set Attack's Target Using Renormalized Influence EstimationConference on Computer and Communications Security (CCS), 2022
Zayd Hammoudeh
Daniel Lowd
TDI
256
36
0
25 Jan 2022
AI Ethics Principles in Practice: Perspectives of Designers and
  Developers
AI Ethics Principles in Practice: Perspectives of Designers and Developers
Conrad Sanderson
David M. Douglas
Qinghua Lu
Emma Schleiger
Jon Whittle
J. Lacey
G. Newnham
S. Hajkowicz
Cathy J. Robinson
David Hansen
FaML
355
64
0
14 Dec 2021
On the Security & Privacy in Federated Learning
On the Security & Privacy in Federated Learning
Gorka Abad
S. Picek
Víctor Julio Ramírez-Durán
A. Urbieta
289
12
0
10 Dec 2021
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
Shawn Shan
A. Bhagoji
Haitao Zheng
Ben Y. Zhao
AAML
286
61
0
13 Oct 2021
Previous
123
Next