Contents: Part I
- Overview of Adversarial Machine Learning 1. Introduction 2. Background and Notation 3. A Framework for Secure Learning Part
II - Causative Attacks on Machine Learning 4. Attacking a Hypersphere Learner 5. Availability Attack Case Study: SpamBayes 6. Integrity Attack Case Study: PCA Detector Part
III - Exploratory Attacks on Machine Learning 7. Privacy-Preserving Mechanisms for SVM Learning 8. Near-Optimal Evasion of Classifiers Part
IV - Future Directions in Adversarial Machine Learning 9. Adversarial Machine Learning Challenges
Part V - Appendixes |