Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Black Box Security
biblio
Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
machine learning algorithms
ML models
black-box setting
black-box attack
Blogs
bot tweets
bots
convolutional neural network
deep learning classifiers
testing
machine learning classifiers
ML-based bot detection algorithms
ML-based models
popular content sharing platform
supervised learning
synonym-based attack
vulnerability constraints
Black Box Security
Resiliency
computer network security
invasive software
feature extraction
social networking (online)
Artificial Intelligence
pubcrawl
composability
Metrics
Cryptography
resilience
pattern classification
Training
learning (artificial intelligence)
machine learning
deep learning
Predictive models
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
linear regression model
black-box setting
CNNs
data science
extensive recent works
generate adversarial examples
generating adversarial samples
high dimensional
image classification
learning models
linear fine-grained search
black-box approach
minimizing noncontinuous function
model parameters
noncontinuous step function problem
numerous advanced image classifiers
queries
white-box setting
Zeroth order
zeroth order optimization algorithm
zeroth-order optimization method
Black Box Security
Cyberspace
query processing
Conferences
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
neural nets
security of data
machine-to-machine communications
regression analysis
Iterative methods
deep neural networks
face recognition
adversarial perturbations
gradient methods
adversarial examples
approximation theory
biblio
Semi-black-box Attacks Against Speech Recognition Systems Using Adversarial Samples
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
automatic speech recognition systems
Black Box Security
targeted ASR systems
semiblack-box attack
semi-black-box attacks
security vulnerabilities
Kaldi
high attack success rate
gradient-independent genetic algorithm
gradient descent algorithm
adversary-expected transcript texts
adversarial samples
adversarial attacks
white-box attacks
Speech recognition
gradient methods
security of data
Deep Neural Network
Perturbation methods
deep neural networks
Statistics
Sociology
genetic algorithms
neural nets
resilience
Resiliency
Metrics
composability
pubcrawl
Hidden Markov models
Computational modeling
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Targeted Adversarial Examples for Black Box Audio Systems
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial perturbations
Black Box Security
white-box attacks
speech-to-text
Speech recognition
gradient methods
gradient estimation
fooling ASR systems
estimation
deep recurrent networks
black-box
black box audio systems
automatic speech recognition systems
audio transcription
audio systems
adversarial generation
security of data
Approximation algorithms
recurrent neural nets
adversarial attack
deep neural networks
Statistics
Sociology
genetic algorithms
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
Task Analysis
biblio
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
adversarial-machine-learning
Black Box Security
white-box access
reinforcement-learning
Reinforcement learning
perturbed inputs
classifier attack
black-box-attack
black-box model
black-box adversarial attacks
AutoAttacker
Cryptography
adversarial example discovery
machine learning model
learning (artificial intelligence)
Data mining
pattern classification
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Black-box Adversarial Machine Learning Attack on Network Traffic Classification
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
machine learning
Training
telecommunication traffic
telecommunication computing
Support vector machines
security threat
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Network traffic classification
Metrics
Adversarial Machine Learning
learning (artificial intelligence)
deep machine learning-based classifiers
deep machine learning techniques
deep machine learning models
Data models
computer network security
composability
black-box adversarial machine
black-box adversarial attack
Black Box Security
autonomous networks
adversarial threats
adversarial perturbations
biblio
Black Box Explanation Guided Decision-Based Adversarial Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
Training data
Black Box Security
targeted deep neural networks
performing decision-based black-box attacks
imperceptive adversarial perturbation
imperceptible adversarial example
derivative-free and constraint optimization problem
decision-based black-box adversarial attack
decision-based adversarial attacks
Constraint optimization
boundary attack
black box explanation guided decision-based adversarial attacks
black box explanation
attack efficiency
artificial intelligence security
Logistics
Cryptography
Perturbation methods
neural nets
Neural networks
learning (artificial intelligence)
resilience
Resiliency
Metrics
composability
pubcrawl
search problems
Artificial Intelligence
optimisation
telecommunication security
Cats
Computational modeling
biblio
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Mitch approach
web security
tools
Task Analysis
supervised learning techniques
supervised learning technique
sensitive HTTP requests
security of data
Security Heuristics
security
Scalability
Resiliency
pubcrawl
predictability
Black Box Security
Manuals
machine learning solution
machine learning approach
machine learning
learning (artificial intelligence)
internet
HTTP requests
Forgery
CSRF vulnerabilities
cross-site request forgery
Cross Site Request Forgery
Browsers
black-box detection