Skip to main content

Showing 1–8 of 8 results for author: De Vel, O

.
  1. arXiv:2408.12122  [pdf, other

    cs.CR

    On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World

    Authors: Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: Object detectors are vulnerable to backdoor attacks. In contrast to classifiers, detectors possess unique characteristics, architecturally and in task execution; often operating in challenging conditions, for instance, detecting traffic signs in autonomous cars. But, our knowledge dominates attacks against classifiers and tests in the "digital domain". To address this critical gap, we conducted… ▽ More

    Submitted 30 October, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

    Comments: Accepted to appear at the 40th Annual Computer Security Applications Conference (ACSAC 2024). Code and dataset are available at https://backdoordetectors.github.io/

  2. arXiv:2403.18309  [pdf, other

    cs.CR

    Bayesian Learned Models Can Detect Adversarial Malware For Free

    Authors: Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: The vulnerability of machine learning-based malware detectors to adversarial attacks has prompted the need for robust solutions. Adversarial training is an effective method but is computationally expensive to scale up to large datasets and comes at the cost of sacrificing model performance for robustness. We hypothesize that adversarial malware exploits the low-confidence regions of models and can… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 29th European Symposium on Research in Computer Security (ESORICS) 2024 Conference

  3. arXiv:2301.12680  [pdf, other

    cs.CR

    Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

    Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We present a new algorithm to train a robust malware detector. Modern malware detectors rely on machine learning algorithms. Now, the adversarial objective is to devise alterations to the malware code to decrease the chance of being detected whilst preserving the functionality and realism of the malware. Adversarial learning is effective in improving robustness but generating functional and realis… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to AAAI 2023 conference

  4. arXiv:2207.00425  [pdf, other

    cs.CR cs.AI cs.LG

    Transferable Graph Backdoor Attack

    Authors: Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and nod… ▽ More

    Submitted 4 July, 2022; v1 submitted 21 June, 2022; originally announced July 2022.

    Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses

  5. arXiv:2010.06131  [pdf, other

    cs.CV cs.CR cs.LG

    Learning to Attack with Fewer Pixels: A Probabilistic Post-hoc Framework for Refining Arbitrary Dense Adversarial Attacks

    Authors: He Zhao, Thanh Nguyen, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung

    Abstract: Deep neural network image classifiers are reported to be susceptible to adversarial evasion attacks, which use carefully crafted images created to mislead a classifier. Many adversarial attacks belong to the category of dense attacks, which generate adversarial examples by perturbing all the pixels of a natural image. To generate sparse perturbations, sparse attacks have been recently developed, w… ▽ More

    Submitted 21 February, 2022; v1 submitted 12 October, 2020; originally announced October 2020.

  6. arXiv:1910.01329  [pdf, other

    cs.LG cs.CR stat.ML

    Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions

    Authors: He Zhao, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung

    Abstract: Deep neural network image classifiers are reported to be susceptible to adversarial evasion attacks, which use carefully crafted images created to mislead a classifier. Recently, various kinds of adversarial attack methods have been proposed, most of which focus on adding small perturbations to input images. Despite the success of existing approaches, the way to generate realistic adversarial imag… ▽ More

    Submitted 3 October, 2019; originally announced October 2019.

  7. arXiv:1902.09062  [pdf, other

    stat.ML cs.CR cs.LG

    Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

    Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani

    Abstract: Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to vulnerabilities previously demonstrated in the supervised learning setting. While most existing work studies the problem in the context of computer vision or console games, this paper focuses on reinforcement learning in autonomous cyber defence under partial observabili… ▽ More

    Submitted 16 August, 2020; v1 submitted 24 February, 2019; originally announced February 2019.

    Comments: 8 pages, 4 figures

  8. arXiv:1808.05770  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    Reinforcement Learning for Autonomous Defence in Software-Defined Networking

    Authors: Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani, David Hubczenko, Christopher Leckie, Paul Montague

    Abstract: Despite the successful application of machine learning (ML) in a wide range of domains, adaptability---the very property that makes machine learning desirable---can be exploited by adversaries to contaminate training and evade classification. In this paper, we investigate the feasibility of applying a specific class of machine learning algorithms, namely, reinforcement learning (RL) algorithms, fo… ▽ More

    Submitted 17 August, 2018; originally announced August 2018.

    Comments: 20 pages, 8 figures