Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2017
DOI: 10.1145/3097983.3098158
|View full text |Cite
|
Sign up to set email alerts
|

Adversary Resistant Deep Neural Networks with an Application to Malware Detection

Abstract: Beyond its highly publicized victories in Go, there have been numerous successful applications of deep learning in information retrieval, computer vision and speech recognition. In cybersecurity, an increasing number of companies have become excited about the potential of deep learning, and have started to use it for various security incidents, the most popular being malware detection.ese companies assert that deep learning (DL) could help turn the tide in the ba le against malware infections. However, deep ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
99
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 138 publications
(102 citation statements)
references
References 18 publications
3
99
0
Order By: Relevance
“…It also "services" multiple active learning objectives. As seen later (and also earlier, in [91]), randomization plays an important role more generally in some defensive schemes against adversarial attacks.…”
Section: Defenses Against Classifier-degrading Dp Attackssupporting
confidence: 54%
See 3 more Smart Citations
“…It also "services" multiple active learning objectives. As seen later (and also earlier, in [91]), randomization plays an important role more generally in some defensive schemes against adversarial attacks.…”
Section: Defenses Against Classifier-degrading Dp Attackssupporting
confidence: 54%
“…Moreover, irrespective of whether detection is truly "easier", this argument (that detection is essentially a subset of robust classification) is not made in many of the robust classification defense papers -it is simply assumed that the only objective of interest is to defeat the attack by correctly classifying in the face of it. Attack detection is not even considered in [23], [91], [72], [52], [100]. By contrast, in Section IV, we will give much stronger arguments for the intrinsic value in making detection inferences and will point out that, in some scenarios, when an attack is present, making robust classification inferences in fact has no utility.…”
Section: B Anomaly Detection (Ad) Of Ttesmentioning
confidence: 99%
See 2 more Smart Citations
“…Wang et al in [36] proposed an adversary resistant technique to obstruct attackers from constructing impactful adversarial samples. They called this adversarial resistant technique "random feature nullification" and is described as follows: For each batch of inputs denoted by X ∈ R n×m , where n is the number of samples and m is the feature vector size, random feature nullification performs element-wise multiplication of X with a randomly generated mask matrix I p ∈ R n×m , where its elements are only 1 or 0.…”
Section: Random Feature Nullificationmentioning
confidence: 99%