Vulnerability and Mitigations in Machine Learning

1. Vulnerability

2. Mitigations

2.1 Adversarial training and testing of ML models

2.2 Standard defense in depth

  • Machine Learning in Cybersecurity: A Guide

3. Acknowledgements

  • Towards the Science of Security and Privacy in Machine Learning
  • Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
  • On Adaptive Attacks to Adversarial Example Defenses