pith. machine review for the scientific record. sign in

arxiv: 1712.03141 · v2 · submitted 2017-12-08 · 💻 cs.CV · cs.CR· cs.GT· cs.LG

Recognition: unknown

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

Authors on Pith no claims yet
classification 💻 cs.CV cs.CRcs.GTcs.LG
keywords learningworkadversarialalgorithmsmachinesecurityalongbeen
0
0 comments X
read the original abstract

Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity. However, it has also been shown that adversarial input perturbations carefully crafted either at training or at test time can easily subvert their predictions. The vulnerability of machine learning to such wild patterns (also referred to as adversarial examples), along with the design of suitable countermeasures, have been investigated in the research field of adversarial machine learning. In this work, we provide a thorough overview of the evolution of this research area over the last ten years and beyond, starting from pioneering, earlier work on the security of non-deep learning algorithms up to more recent work aimed to understand the security properties of deep learning algorithms, in the context of computer vision and cybersecurity tasks. We report interesting connections between these apparently-different lines of work, highlighting common misconceptions related to the security evaluation of machine-learning algorithms. We review the main threat models and attacks defined to this end, and discuss the main limitations of current work, along with the corresponding future challenges towards the design of more secure learning algorithms.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. A Systematic Survey of Security Threats and Defenses in LLM-Based AI Agents: A Layered Attack Surface Framework

    cs.CR 2026-04 unverdicted novelty 7.0

    A new 7x4 taxonomy organizes agentic AI security threats by architectural layer and persistence timescale, revealing under-explored upper layers and missing defenses after surveying 116 papers.

  2. SL5 Standard for AI Security

    cs.CR 2026-05 unverdicted novelty 3.0

    SL5 defines a security posture for frontier AI that could plausibly counter top-tier state cyber operations, with requirements focused on advance planning for datacenter infrastructure.