Practical Evasion of a Learning-Based Classifier: A Case Study
暂无分享,去创建一个
[1] E. Parzen. On Estimation of a Probability Density Function and Mode , 1962 .
[2] Ming Li,et al. Learning in the presence of malicious errors , 1993, STOC '88.
[3] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[4] Fabio Roli,et al. Methods for Designing Multiple Classifier Systems , 2001, Multiple Classifier Systems.
[5] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[6] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[7] Christopher Meek,et al. Good Word Attacks on Statistical Spam Filters , 2005, CEAS.
[8] Wenke Lee,et al. Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[9] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[10] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[11] Konrad Rieck,et al. Language models for detection of unknown attacks in network traffic , 2006, Journal in Computer Virology.
[12] Wenke Lee,et al. Evading network anomaly detection systems: formal reasoning and practical techniques , 2006, CCS '06.
[13] Amir Globerson,et al. Nightmare at test time: robust learning by feature deletion , 2006, ICML.
[14] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[15] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[16] Blaine Nelson,et al. Exploiting Machine Learning to Subvert Your Spam Filter , 2008, LEET.
[17] Ohad Shamir,et al. Learning to classify with missing and corrupted features , 2008, ICML '08.
[18] Muhammad Zubair Shafiq,et al. Embedded Malware Detection Using Markov n-Grams , 2008, DIMVA.
[19] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[20] Fabio Roli,et al. Multiple Classifier Systems for Adversarial Classification Tasks , 2009, MCS.
[21] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[22] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[23] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[24] Andreas Dewald,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks , 2010 .
[25] Olivier Thonnard. A multicriteria clustering approach to support attack attribution in cyberspace , 2010 .
[26] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[27] Pavel Laskov,et al. Static detection of malicious JavaScript-bearing PDF documents , 2011, ACSAC '11.
[28] Sebastián A. Ríos,et al. Outlier-Based Approaches for Intrinsic and External Plagiarism Detection , 2011, KES.
[29] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[30] Yukie Ikedaa,et al. Knowledge Based and Intelligent Information and Engineering Systems An Evacuation Route Planning for Safety Route Guidance System after Natural Disaster Using Multi-Objective Genetic Algorithm , 2016 .
[31] D. Sculley,et al. Detecting adversarial advertisements in the wild , 2011, KDD.
[32] Tobias Scheffer,et al. Static prediction games for adversarial learning problems , 2012, J. Mach. Learn. Res..
[33] Marius Kloft,et al. Security analysis of online centroid anomaly detection , 2010, J. Mach. Learn. Res..
[34] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[35] Joachim M. Buhmann,et al. Bayesian mixed-effects inference on classification performance in hierarchical data sets , 2012, J. Mach. Learn. Res..
[36] Angelos Stavrou,et al. Malicious PDF detection using metadata and structural features , 2012, ACSAC '12.
[37] Rachel Greenstadt,et al. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity , 2012, TSEC.
[38] Vitaly Shmatikov,et al. Abusing File Processing in Malware Detectors for Fun and Profit , 2012, 2012 IEEE Symposium on Security and Privacy.
[39] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[40] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[41] Giorgio Giacinto,et al. Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection , 2013, ASIA CCS '13.
[42] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[43] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[44] David Mandell Freeman,et al. Using naive bayes to detect spammy names in social networks , 2013, AISec.
[45] Niels Provos,et al. CAMP: Content-Agnostic Malware Protection , 2013, NDSS.
[46] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[47] Kang Li,et al. PeerRush: Mining for unwanted P2P traffic , 2013, J. Inf. Secur. Appl..