Searched for: subject%3A%22Adversarial%255C+Machine%255C+Learning%22
(1 - 8 of 8)
document
Vlasenko, Mikhail (author)
Inverse Reinforcement Learning (IRL) is a subfield of Reinforcement Learning (RL) that focuses on recovering the reward function using expert demonstrations. In the field of IRL, Adversarial IRL (AIRL) is a promising algorithm that is postulated to recover non-linear rewards in environments with unknown dynamics. This study investigates the...
bachelor thesis 2023
document
feng, Clio (author)
Recently, while gaze estimation has gained a substantial improvement by using deep learning models, research had shown that neural networks are weak against adversarial attacks. Despite researchers has been done numerous on adversarial training, there are little to no studies on adversarial training in gaze estimation. Therefore, the objective...
bachelor thesis 2023
document
Nowroozi, Ehsan (author), Mohammadi, Mohammadreza (author), Savas, Erkay (author), Mekdad, Yassine (author), Conti, M. (author)
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications,...
journal article 2023
document
Buijs, Cas (author)
Machine learning is used for security purposes, to differ between the benign and the malicious. Where decision trees can lead to understandable and explainable classifications, an adversary could manipulate the model input to evade detection, e.g. the malicious been classified as the benign. State-of-the-art techniques improve the robustness by...
master thesis 2020
document
Vos, Daniƫl (author)
In the present day we use machine learning for sensitive tasks that require models to be both understandable and robust. Although traditional models such as decision trees are understandable, they suffer from adversarial attacks. When a decision tree is used to differentiate between a user's benign and malicious behavior, an adversarial attack...
master thesis 2020
document
Erba, Alessandro (author), Taormina, R. (author), Galelli, Stefano (author), Pogliani, Marcello (author), Carminati, Michele (author), Zanero, Stefano (author), Tippenhauer, Nils Ole (author)
Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based detectors operate on the measured sensor data, leveraging physical process models learned a priori....
conference paper 2020
document
Valsamos, Charalampos Michail (author)
Nowadays with the growth of social media, users upload millions of photos in different platforms online. Researchers in the field of computer vision devote their time and effort to analyze images in order to gain valuable insight. Data<br/>analysis and classification can be impeded by different factors. One of which is the image filters that are...
master thesis 2019
document
van de Kamp, Lars (author)
Machine learning techniques receive significant responsibilities, despite growing privacy concerns. Early-stage autonomous vehicles are increasingly appearing on the streets, carrying the burden of transporting human-lives to their destination. Meanwhile, doctors are involving Artificial Intelligence (AI) in their medical diagnoses, basing...
master thesis 2018
Searched for: subject%3A%22Adversarial%255C+Machine%255C+Learning%22
(1 - 8 of 8)