Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Half-day Tutorial

被引:58
作者
Biggio, Battista [1 ,3 ]
Roli, Fabio [2 ,3 ]
机构
[1] Univ Cagliari, Cagliari, Italy
[2] Univ Cagliari, Comp Engn, Cagliari, Italy
[3] Pluribus One, Cagliari, Italy
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
关键词
Adversarial Machine Learning; Training Data Poisoning; Evasion Attacks; Adversarial Examples; Deep Learning;
D O I
10.1145/3243734.3264418
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep neural networks and machine-learning algorithms are pervasively used in several applications, ranging from computer vision to computer security. In most of these applications, the learning algorithm has to face intelligent and adaptive attackers who can carefully manipulate data to purposely subvert the learning process. As these algorithms have not been originally designed under such premises, they have been shown to be vulnerable to well-crafted, sophisticated attacks, including training-time poisoning and test-time evasion attacks (also known as adversarial examples). The problem of countering these threats and learning secure classifiers in adversarial settings has thus become the subject of an emerging, relevant research field known as adversarial machine learning. The purposes of this tutorial are: (a) to introduce the fundamentals of adversarial machine learning to the security community; (b) to illustrate the design cycle of a learning-based pattern recognition system for adversarial tasks; (c) to present novel techniques that have been recently proposed to assess performance of pattern classifiers and deep learning algorithms under attack, evaluate their vulnerabilities, and implement defense strategies that make learning algorithms more robust to attacks; and (d) to show some applications of adversarial machine learning to pattern recognition tasks like object recognition in images, biometric identity recognition, spam and malware detection.
引用
收藏
页码:2154 / 2156
页数:3
相关论文
共 18 条
[1]  
[Anonymous], 2017, INT C MACH LEARN ICM
[2]  
[Anonymous], 2016, P 23 ANN NETW DISTR
[3]  
Athalye A, 2018, PR MACH LEARN RES, V80
[4]  
Barreno Marco, 2006, P 2006 ACM S INFORM, P16
[5]   Towards Open Set Deep Networks [J].
Bendale, Abhijit ;
Boult, Terrance E. .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :1563-1572
[6]  
Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
[7]  
Biggio B, 2012, ARXIV12066389
[8]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[9]   Security Evaluation of Pattern Classifiers under Attack [J].
Biggio, Battista ;
Fumera, Giorgio ;
Roli, Fabio .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) :984-996
[10]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57