Black Box Attacks on Deep Anomaly Detectors
暂无分享,去创建一个
[1] Nhien-An Le-Khac,et al. Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[2] Qiang Liu,et al. SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection , 2018, ICCCS.
[3] Lior Rokach,et al. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers , 2017, RAID.
[4] Bo Zong,et al. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection , 2018, ICLR.
[5] Logan Engstrom,et al. Query-Efficient Black-box Adversarial Examples (superceded) , 2017 .
[6] Matthias Bethge,et al. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models , 2017, ICLR.
[7] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[8] James Newsome,et al. Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.
[9] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[10] George Danezis,et al. Learning Universal Adversarial Perturbations with Generative Models , 2017, 2018 IEEE Security and Privacy Workshops (SPW).
[11] Yevgeniy Vorobeychik,et al. Feature Cross-Substitution in Adversarial Classification , 2014, NIPS.
[12] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[13] Ying Tan,et al. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.
[14] Mohit Sewak,et al. An investigation of a deep learning based malware detection system , 2018, ARES.
[15] Paul Jacob,et al. Host Based Intrusion Detection System with Combined CNN/RNN Model , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.
[16] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[17] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[18] James Bailey,et al. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality , 2018, ICLR.
[19] Thomas Hofmann,et al. The Odds are Odd: A Statistical Test for Detecting Adversarial Examples , 2019, ICML.
[20] Jorge Nocedal,et al. Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization , 1997, TOMS.
[21] Hyrum S. Anderson,et al. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning , 2018, ArXiv.
[22] Marco Morana,et al. Malware Detection through Low-level Features and Stacked Denoising Autoencoders , 2018, ITASEC.
[23] Slawomir Grzonkowski,et al. Enabling Trust in Deep Learning Models: A Digital Forensics Case Study , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[24] Jean-Pierre Seifert,et al. Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems , 2018, ArXiv.
[25] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[26] Somesh Jha,et al. Exploring Connections Between Active Learning and Model Extraction , 2018, USENIX Security Symposium.
[27] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[28] H. Anderson,et al. Evading Machine Learning Malware Detection , 2017 .
[29] Patrick D. McDaniel,et al. Adversarial Perturbations Against Deep Neural Networks for Malware Classification , 2016, ArXiv.
[30] Eric Jones,et al. SciPy: Open Source Scientific Tools for Python , 2001 .
[31] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[32] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[33] Bernhard Schölkopf,et al. Support Vector Method for Novelty Detection , 1999, NIPS.
[34] Dan Boneh,et al. The Space of Transferable Adversarial Examples , 2017, ArXiv.
[35] Ning Chen,et al. A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection , 2017, ICONIP.
[36] Abdullah Al-Dujaili,et al. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[37] Nhien-An Le-Khac,et al. Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.
[38] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[39] Chuan Sheng Foo,et al. Adversarially Learned Anomaly Detection , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[40] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[41] Lewis D. Griffin,et al. A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples , 2016, ArXiv.
[42] Paolo Papotti,et al. Query-limited Black-box Attacks to Classifiers , 2017, ArXiv.
[43] Alexander Binder,et al. Deep One-Class Classification , 2018, ICML.
[44] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..
[45] Nhien-An Le-Khac,et al. One-Class Collective Anomaly Detection Based on LSTM-RNNs , 2017, Trans. Large Scale Data Knowl. Centered Syst..
[46] Tom Goldstein,et al. Are adversarial examples inevitable? , 2018, ICLR.
[47] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[48] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[49] Roland Wagner,et al. Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI , 2017, Lecture Notes in Computer Science.
[50] Zhi Xue,et al. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection , 2018, PAKDD.
[51] D. Dunson,et al. Efficient Manifold and Subspace Approximations with Spherelets , 2017 .
[52] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[53] Dawn Xiaodong Song,et al. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms , 2018, ECCV.
[54] Blaine Nelson,et al. Exploiting Machine Learning to Subvert Your Spam Filter , 2008, LEET.
[55] Lijun Zhang,et al. Query-Efficient Black-Box Attack by Active Learning , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[56] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[57] Bhavani M. Thuraisingham,et al. Adversarial support vector machine learning , 2012, KDD.
[58] Raghavendra Chalapathy University of Sydney,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[59] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[60] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[61] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.