Research field that lies at the intersection of machine learning and computer security
Not to be confused with Generative adversarial network.
Part of a series on
Machine learning and data mining
Paradigms
Supervised learning
Unsupervised learning
Online learning
Batch learning
Meta-learning
Semi-supervised learning
Self-supervised learning
Reinforcement learning
Curriculum learning
Rule-based learning
Quantum machine learning
Problems
Classification
Generative modeling
Regression
Clustering
Dimensionality reduction
Density estimation
Anomaly detection
Data cleaning
AutoML
Association rules
Semantic analysis
Structured prediction
Feature engineering
Feature learning
Learning to rank
Grammar induction
Ontology learning
Multimodal learning
Supervised learning (classification • regression)
Apprenticeship learning
Decision trees
Ensembles
Bagging
Boosting
Random forest
k-NN
Linear regression
Naive Bayes
Artificial neural networks
Logistic regression
Perceptron
Relevance vector machine (RVM)
Support vector machine (SVM)
Clustering
BIRCH
CURE
Hierarchical
k-means
Fuzzy
Expectation–maximization (EM)
DBSCAN
OPTICS
Mean shift
Dimensionality reduction
Factor analysis
CCA
ICA
LDA
NMF
PCA
PGD
t-SNE
SDL
Structured prediction
Graphical models
Bayes net
Conditional random field
Hidden Markov
Anomaly detection
RANSAC
k-NN
Local outlier factor
Isolation forest
Artificial neural network
Autoencoder
Cognitive computing
Deep learning
DeepDream
Feedforward neural network
Recurrent neural network
LSTM
GRU
ESN
reservoir computing
Restricted Boltzmann machine
GAN
Diffusion model
SOM
Convolutional neural network
U-Net
Transformer
Vision
Mamba
Spiking neural network
Memtransistor
Electrochemical RAM (ECRAM)
Reinforcement learning
Q-learning
SARSA
Temporal difference (TD)
Multi-agent
Self-play
Learning with humans
Active learning
Crowdsourcing
Human-in-the-loop
RLHF
Model diagnostics
Coefficient of determination
Confusion matrix
Learning curve
ROC curve
Mathematical foundations
Kernel machines
Bias–variance tradeoff
Computational learning theory
Empirical risk minimization
Occam learning
PAC learning
Statistical learning
VC theory
Machine-learning venues
ECML PKDD
NeurIPS
ICML
ICLR
IJCAI
ML
JMLR
Related articles
Glossary of artificial intelligence
List of datasets for machine-learning research
List of datasets in computer vision and image processing
Outline of machine learning
v
t
e
Adversarial machine learning is the study of the attacks on machine learning algorithms, and of the defenses against such attacks.[1] A survey from May 2020 exposes the fact that practitioners report a dire need for better protecting machine learning systems in industrial applications.[2]
Most machine learning techniques are mostly designed to work on specific problem sets, under the assumption that the training and test data are generated from the same statistical distribution (IID). However, this assumption is often dangerously violated in practical high-stake applications, where users may intentionally supply fabricated data that violates the statistical assumption.
Most common attacks in adversarial machine learning include evasion attacks,[3] data poisoning attacks,[4] Byzantine attacks[5] and model extraction.[6]
^Kianpour, Mazaher; Wen, Shao-Fang (2020). "Timing Attacks on Machine Learning: State of the Art". Intelligent Systems and Applications. Advances in Intelligent Systems and Computing. Vol. 1037. pp. 111–125. doi:10.1007/978-3-030-29516-5_10. ISBN 978-3-030-29515-8. S2CID 201705926.
^Goodfellow, Ian; McDaniel, Patrick; Papernot, Nicolas (25 June 2018). "Making machine learning robust against adversarial inputs". Communications of the ACM. 61 (7): 56–66. doi:10.1145/3134599. ISSN 0001-0782.[permanent dead link]
^Geiping, Jonas; Fowl, Liam H.; Huang, W. Ronny; Czaja, Wojciech; Taylor, Gavin; Moeller, Michael; Goldstein, Tom (2020-09-28). Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching. International Conference on Learning Representations 2021 (Poster).
^El-Mhamdi, El Mahdi; Farhadkhani, Sadegh; Guerraoui, Rachid; Guirguis, Arsany; Hoang, Lê-Nguyên; Rouault, Sébastien (2021-12-06). "Collaborative Learning in the Jungle (Decentralized, Byzantine, Heterogeneous, Asynchronous and Nonconvex Learning)". Advances in Neural Information Processing Systems. 34. arXiv:2008.00742.
^Tramèr, Florian; Zhang, Fan; Juels, Ari; Reiter, Michael K.; Ristenpart, Thomas (2016). Stealing Machine Learning Models via Prediction {APIs}. 25th USENIX Security Symposium. pp. 601–618. ISBN 978-1-931971-32-4.
and 23 Related for: Adversarial machine learning information
Adversarialmachinelearning is the study of the attacks on machinelearning algorithms, and of the defenses against such attacks. A survey from May 2020...
single adversarially chosen pixel. Machinelearning models are often vulnerable to manipulation and/or evasion via adversarialmachinelearning. Researchers...
Computational learning theory – studying the design and analysis of machinelearning algorithms. Grammar induction Meta-learningAdversarialmachinelearning Predictive...
A generative adversarial network (GAN) is a class of machinelearning frameworks and a prominent framework for approaching generative AI. The concept was...
Quantum machinelearning is the integration of quantum algorithms within machinelearning programs. The most common use of the term refers to machine learning...
Reinforcement learning is one of three basic machinelearning paradigms, alongside supervised learning and unsupervised learning. Reinforcement learning differs...
In computer science, online machinelearning is a method of machinelearning in which data becomes available in a sequential order and is used to update...
Deep learning is the subset of machinelearning methods based on artificial neural networks (ANNs) with representation learning. The adjective "deep" refers...
these patterns. This was called "artificial curiosity." Earlier adversarialmachinelearning systems "neither involved unsupervised neural networks nor were...
The privacy risk is expected to grow as machinelearning techniques and text corpora develop. All adversarial stylometry shares the core idea of faithfully...
recognition technology make dazzle makeup increasingly ineffective. Adversarialmachinelearning Valenti, Lauren (March 30, 2018). "Yes, There's a Way to Outsmart...
Learning to rank or machine-learned ranking (MLR) is the application of machinelearning, typically supervised, semi-supervised or reinforcement learning...
Applying classical methods of machinelearning to the study of quantum systems is the focus of an emergent area of physics research. A basic example of...
governance is not exceptional. Regulated parties might even employ adversarialmachinelearning in order to fool algorithmic models. Eric Berne identified a...
AI (XAI), often overlapping with Interpretable AI, or Explainable MachineLearning (XML), either refers to an artificial intelligence (AI) system over...
Machinelearning techniques used for content generation include Long Short-Term Memory (LSTM) Recurrent Neural Networks (RNN), Generative Adversarial...
transforming of illicit funds into ostensibly legitimate funds. In adversarialmachinelearning, information laundering refers to a general strategy that purposely...
Generative Adversarial Network (WGAN) is a variant of generative adversarial network (GAN) proposed in 2017 that aims to "improve the stability of learning, get...
source labeling task. This can be achieved through the use of Adversarialmachinelearning techniques where feature representations from samples in different...
to artificial intelligence. Formed in 2011, it combined open-ended machinelearning research with information systems and large-scale computing resources...
the top seven finalists. Her most recent work is understanding adversarialmachinelearning, and blockchains. Song is the Founder of Oasis Labs. At UC Berkeley...
for one year. Microsoft and MITRE partnered on the open source AdversarialMachineLearning Threat Matrix in collaboration with IBM, Nvidia, and academic...