Data poisoning attacks against machine learning algorithms
Tài liệu tham khảo
Al-Zoubi, 2018, Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts, Knowledge-Based Systems, 10.1016/j.knosys.2018.04.025
Bahtiyar, 2019, A multi-dimensional machine learning approach to predict advanced malware, Computer Networks, 160, 118, 10.1016/j.comnet.2019.06.015
Bakhshandeh, 2019
Biggio, 2013, 387
Biggio, 2011, Support vector machines under adversarial label noise., Journal of Machine Learning Research - Proceedings Track, 20, 97
Biggio, 2012
Chakraborty, 2018
Chan, 2017, Data sanitization against adversarial label contamination based on data complexity, International Journal of Machine Learning and Cybernetics, 9
Chan-Hon-Tong, 2018, An algorithm for generating invisible data poisoning using adversarial noise that breaks image classification deep learning, Machine Learning and Knowledge Extraction, 1, 192, 10.3390/make1010011
Chen, 2017, An effective conversation-based botnet detection method, Mathematical Problems in Engineering, 2017, 1, 10.1155/2017/1964165
Chen, 2017, Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach, Computers & Security, 73
Cody, 2015
Dada, 2019, Machine learning for email spam filtering: review, approaches and open research problems, Heliyon, 5, 10.1016/j.heliyon.2019.e01802
D’Angelo, 2019, Malware detection in mobile environments based on autoencoders and api-images, Journal of Parallel and Distributed Computing, 137
Drews, 2019
Duddu, 2018, A survey of adversarial machine learning in cyber warfare, Defence Science Journal, 68, 356, 10.14429/dsj.68.12371
Dunn, 2020, Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things, Sustainability, 12, 6434, 10.3390/su12166434
Frénay, 2014, Classification in the presence of label noise: A survey, IEEE Transactions on Neural Networks and Learning Systems, 25, 845, 10.1109/TNNLS.2013.2292894
Ghosh, 2017
Guo, 2019
Hayes, 2017
Imam, 2019
Jiang, 2018, Credit card fraud detection: A novel approach using aggregation strategy and feedback mechanism, IEEE Internet of Things Journal, 1
Li, 2018
Lim, 2019, Algorithmic decision-making in avs: Understanding ethical and technical concerns for smart cities, Sustainability, 11, 5791, 10.3390/su11205791
Liu, 2020, Privacy and security issues in deep learning: A survey, IEEE Access, 1
Liu, 2016, 1
Mwinyi, 2018, 1
Nassif, 2019, Speech recognition using deep neural networks: A systematic review, IEEE Access, 1
Nelson, 2008
Newell, 2014, On the practicality of integrity attacks on document-level sentiment analysis, Proceedings of the ACM Conference on Computer and Communications Security, 2014, 83
Paudice, 2018
Pitropakis, 2019, A taxonomy and survey of attacks against machine learning, Computer Science Review, 34, 10.1016/j.cosrev.2019.100199
Rubinstein, 2009, 1
Sabherwal, 2019
Su, 2019, One pixel attack for fooling deep neural networks, IEEE Transactions on Evolutionary Computation, 23, 828, 10.1109/TEVC.2019.2890858
Urcuqui López, 2016, 1
Vinod, 2018, A machine learning based approach to detect malicious android apps using discriminant system calls, Future Generation Computer Systems, 94
Wang, 2019, A mobile malware detection method using behavior features in network traffic, Journal of Network and Computer Applications, 133, 10.1016/j.jnca.2018.12.014
Wang, 2019, Botmark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511
Wang, 2014
Wolberg, 2017
Xiao, 2015, Support vector machines under adversarial label contamination, Neurocomputing, 160, 10.1016/j.neucom.2014.08.081
Xiao, 2012, 870
Zhang, 2021, Label flipping attacks against naive bayes on spam filtering systems, Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies
Zhou, Y., Kantarcioglu, M., Thuraisingham, B., & Xi, B. (2012). Adversarial support vector machine learning. In Proceedings of the ACM SIGKDD International conference on knowledge discovery and data mining. http://dx.doi.org/10.1145/2339530.2339697.
Zügner, 2020, Adversarial attacks on graph neural networks: Perturbations and their patterns, ACM Transactions on Knowledge Discovery from Data, 14, 10.1145/3394520