Data poisoning attacks against autoregressive models, pp.1452-1458, 2016. ,
Long duration data poisoning attacks on Bayesian networks, 2019. ,
Cyber attacks against the pc learning algorithm, ECML PKDD 2018 Workshops, pp.159-176, 2019. ,
Bayesian structure learning attacks, 2018. ,
How to generate the network you want with the pc learning algorithm, Proceedings of the 11th Workshop on Uncertainty Processing (WUPES'18), pp.1-12, 2018. ,
The security of machine learning, Machine Learning, vol.81, issue.2, pp.121-148, 2010. ,
Can machine learning be secure?, Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp.16-25, 2006. ,
Poisoning complete-linkage hierarchical clustering, Joint IAPR International Workshops on Statistical Techniques in Pattern Recognition (SPR) and Structural and Syntactic Pattern Recognition (SSPR), pp.42-52, 2014. ,
Poisoning attacks to compromise face templates, Biometrics (ICB), 2013 International Conference on, pp.1-7, 2013. ,
Poisoning adaptive biometric systems, Joint IAPR International Workshops on Statistical Techniques in Pattern Recognition (SPR) and Structural and Syntactic Pattern Recognition (SSPR), pp.417-425, 2012. ,
Poisoning attacks against support vector machines, Proceedings of the 29th International Coference on International Conference on Machine Learning, pp.1467-1474, 2012. ,
Is data clustering in adversarial settings secure, Proceedings of the 2013 ACM workshop on Artificial intelligence and security, pp.87-98, 2013. ,
Adversarial examples are not easily detected: Bypassing ten detection methods, Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp.3-14, 2017. ,
Data sanitization against adversarial label contamination based on data complexity, International Journal of Machine Learning and Cybernetics, vol.9, issue.6, pp.1039-1052, 2018. ,
Detecting adversarial samples from artifacts, 2017. ,
On the security of machine learning in malware c&c detection: A survey, ACM Computing Surveys (CSUR), vol.49, issue.3, p.59, 2016. ,
, Explaining and harnessing adversarial examples, 2014.
Adversarial machine learning, Proceedings of the 4th ACM workshop on Security and artificial intelligence, pp.43-58, 2011. ,
A comparison of structural distance measures for causal bayesian network models. Recent Advances in Intelligent Information Systems, Challenging Problems of Science, Computer Science series pp, pp.443-456, 2009. ,
Evasion and hardening of tree ensemble classifiers, International Conference on Machine Learning, pp.2387-2396, 2016. ,
Understanding black-box predictions via influence functions, International Conference on Machine Learning, pp.1885-1894, 2017. ,
Practical evasion of a learning-based classifier: A case study, Security and Privacy (SP), 2014 IEEE Symposium on, pp.197-211, 2014. ,
Local computations with probabilities on graphical structures and their application to expert systems, Journal of the Royal Statistical Society. Series B (Methodological), pp.157-224, 1988. ,
A survey on security threats and defensive techniques of machine learning: a data driven view, IEEE access, vol.6, pp.12103-12117, 2018. ,
Safetynet: Detecting and rejecting adversarial examples robustly, 2017 IEEE International Conference on Computer Vision (ICCV), pp.446-454, 2017. ,
The hugin tool for probabilistic graphical models, International Journal on Artificial Intelligence Tools, vol.14, issue.03, pp.507-543, 2005. ,
The security of latent dirichlet allocation, Artificial Intelligence and Statistics, pp.681-689, 2015. ,
Using machine teaching to identify optimal training-set attacks on machine learners, AAAI, pp.2871-2877, 2015. ,
Towards poisoning of deep learning algorithms with backgradient optimization, Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp.27-38, 2017. ,
Misleading learners: Co-opting your spam filter, Machine learning in cyber trust, pp.17-51, 2009. ,
Bayesian networks and decision graphs, 2009. ,
ahugin: A system creating adaptive causal probabilistic networks, Uncertainty in Artificial Intelligence, pp.223-229, 1992. ,
, Detection of adversarial training examples in poisoning attacks through anomaly detection, 2018.
Causation, prediction, and search, 2000. ,
, Data poisoning attacks against online learning, 2018.
, Generative poisoning attack method against neural networks, 2017.
The wisdom of the crowd in combinatorial problems, Cognitive science, vol.36, issue.3, pp.452-470, 2012. ,