Useful Links
Computer Science
Artificial Intelligence
Machine Learning
Machine Learning and Cybersecurity
1. Foundational Concepts
2. Data Sources and Preprocessing for Cybersecurity
3. Core Applications of Machine Learning in Cybersecurity
4. Advanced Machine Learning Techniques
5. Adversarial Machine Learning and Security
6. Model Development and Deployment
7. Explainable AI and Interpretability
8. Ethical Considerations and Responsible AI
9. Emerging Trends and Future Directions
Adversarial Machine Learning and Security
Threat Model for ML Systems
Adversary Goals
Integrity Attacks
Availability Attacks
Privacy Attacks
Adversary Knowledge
Perfect Knowledge (White-box)
Limited Knowledge (Black-box)
Partial Knowledge (Gray-box)
Adversary Capabilities
Training Data Manipulation
Test Data Manipulation
Model Access
Types of Adversarial Attacks
Evasion Attacks
Adversarial Examples
Fast Gradient Sign Method (FGSM)
Projected Gradient Descent (PGD)
Carlini & Wagner (C&W) Attack
Feature Manipulation
Gradient-Based Methods
Optimization-Based Methods
Domain-Specific Evasion
Malware Evasion
Network Traffic Evasion
Spam Evasion
Poisoning Attacks
Training Data Poisoning
Label Flipping
Data Injection
Backdoor Attacks
Trigger-Based Backdoors
Clean-Label Backdoors
Model Poisoning
Federated Learning Poisoning
Extraction Attacks
Model Stealing
Equation-Solving Attacks
Path-Finding Attacks
Property Inference
Membership Inference
Shadow Model Attacks
Threshold Attacks
Inversion Attacks
Model Inversion
Property Inference
Attribute Inference
Defenses Against Adversarial Attacks
Proactive Defenses
Adversarial Training
Min-Max Optimization
Adversarial Example Generation
Defensive Distillation
Temperature Scaling
Knowledge Transfer
Certified Defenses
Randomized Smoothing
Interval Bound Propagation
Robust Optimization
Distributionally Robust Optimization
Worst-Case Training
Reactive Defenses
Input Preprocessing
Feature Squeezing
Spatial Smoothing
JPEG Compression
Adversarial Detection
Statistical Tests
Neural Network Detectors
Reconstruction-Based Detection
Input Transformation
Random Transformations
Defensive Transformations
Architectural Defenses
Ensemble Methods
Diverse Model Ensembles
Randomized Ensembles
Network Architecture Modifications
Defensive Layers
Gradient Masking
Evaluation of Adversarial Robustness
Robustness Metrics
Adversarial Accuracy
Certified Accuracy
Attack Success Rate
Evaluation Methodologies
Adaptive Attacks
Gradient-Free Attacks
Transfer Attacks
Benchmarking
Standard Datasets
Evaluation Frameworks
Robustness Competitions
Previous
4. Advanced Machine Learning Techniques
Go to top
Next
6. Model Development and Deployment