2019
DOI: 10.1016/j.jpdc.2019.03.003
|View full text |Cite
|
Sign up to set email alerts
|

The security of machine learning in an adversarial setting: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
134
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 175 publications
(134 citation statements)
references
References 36 publications
0
134
0
Order By: Relevance
“…Model-based predictions could help to identify opportunities to improve market regulations. Another area of opportunity is to help platforms and fraud detection firms design better approaches to detect and reverse ad fraud. In general, the topic of how to attack machine learning algorithms and how to resist attack is a topic of active research (e.g., Wang et al 2019). Consideration of adversarial methods may help firms anticipate and defend against future developments in fraud technology.…”
Section: Digital Advertising Fraudmentioning
confidence: 99%
“…Model-based predictions could help to identify opportunities to improve market regulations. Another area of opportunity is to help platforms and fraud detection firms design better approaches to detect and reverse ad fraud. In general, the topic of how to attack machine learning algorithms and how to resist attack is a topic of active research (e.g., Wang et al 2019). Consideration of adversarial methods may help firms anticipate and defend against future developments in fraud technology.…”
Section: Digital Advertising Fraudmentioning
confidence: 99%
“…Zhang et al [7] proposed an approach for crowed assessing the security and trustworthiness of open social networks based on signaling theory. e authors [5] presented a detailed overview of the security properties investigation of machine learning algorithms. ey have analysed the security model of ML to build up a blueprint for multidisciplinary area of research and, after that, the attack methods and discussed the strategies of defense against them.…”
Section: Related Workmentioning
confidence: 99%
“…e technology is ever playing an important role in human life and made things easy. With the developments of technology, security remains one of the major concerns for communication and interaction [1][2][3][4][5][6][7][8][9][10]. Since the last few decades, the attacks on information security become raised and intruders are trying to capture ordination important information for their own benefits.…”
Section: Introductionmentioning
confidence: 99%
“…The network communication rules between each server and the host are configured through a firewall [38]. The network is divided into three areas.…”
Section: A Experimental Environmentmentioning
confidence: 99%