Academic literature on the topic 'Adversarial Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversarial Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adversarial Testing"
Lindley, Dennis V., and Nozer D. Singpurwalla. "Adversarial Life Testing." Journal of the Royal Statistical Society: Series B (Methodological) 55, no. 4 (September 1993): 837–47. http://dx.doi.org/10.1111/j.2517-6161.1993.tb01944.x.
Full textRufo, M. J., J. Martín, and C. J. Pérez. "Adversarial life testing: A Bayesian negotiation model." Reliability Engineering & System Safety 131 (November 2014): 118–25. http://dx.doi.org/10.1016/j.ress.2014.06.007.
Full textDürr, Christoph, Thomas Erlebach, Nicole Megow, and Julie Meißner. "An Adversarial Model for Scheduling with Testing." Algorithmica 82, no. 12 (July 10, 2020): 3630–75. http://dx.doi.org/10.1007/s00453-020-00742-2.
Full textEdmond, Gary. "Forensic science and the myth of adversarial testing." Current Issues in Criminal Justice 32, no. 2 (December 1, 2019): 146–79. http://dx.doi.org/10.1080/10345329.2019.1689786.
Full textHoque, Endadul, Hyojeong Lee, Rahul Potharaju, Charles Killian, and Cristina Nita-Rotaru. "Automated Adversarial Testing of Unmodified Wireless Routing Implementations." IEEE/ACM Transactions on Networking 24, no. 6 (December 2016): 3369–82. http://dx.doi.org/10.1109/tnet.2016.2520474.
Full textLiu, Xiaolei, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, and Xiaojiang Du. "TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems." Sensors 18, no. 8 (August 10, 2018): 2630. http://dx.doi.org/10.3390/s18082630.
Full textCHAN-HON-TONG, Adrien. "An Algorithm for Generating Invisible Data Poisoning Using Adversarial Noise That Breaks Image Classification Deep Learning." Machine Learning and Knowledge Extraction 1, no. 1 (November 9, 2018): 192–204. http://dx.doi.org/10.3390/make1010011.
Full textLiu, Xiaolei, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Hao Wang, and Mohsen Guizani. "Adversarial Samples on Android Malware Detection Systems for IoT Systems." Sensors 19, no. 4 (February 25, 2019): 974. http://dx.doi.org/10.3390/s19040974.
Full textZhang, Pengfei, and Xiaoming Ju. "Adversarial Sample Detection with Gaussian Mixture Conditional Generative Adversarial Networks." Mathematical Problems in Engineering 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/8268249.
Full textBateman, Ian, Daniel Kahneman, Alistair Munro, Chris Starmer, and Robert Sugden. "Testing competing models of loss aversion: an adversarial collaboration." Journal of Public Economics 89, no. 8 (August 2005): 1561–80. http://dx.doi.org/10.1016/j.jpubeco.2004.06.013.
Full textDissertations / Theses on the topic "Adversarial Testing"
McDonough, Kenton Robert. "Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104159.
Full textMaster of Science
Over the last decade, container technology has fundamentally changed the landscape of commercial cloud computing services. By abstracting away many of the system details required to deploy software, developers can rapidly prototype, deploy, and take advantage of massive distributed frameworks when deploying new software products. These paradigms are supported with corresponding business models offered by cloud providers, who allocate space on powerful physical hardware among many potentially competing services. Unfortunately, recent work has shown that the isolation guarantees provided by containers are not absolute. Due to inconsistencies in the way containers have been implemented by the Linux kernel, there exist vulnerabilities that allow containerized programs to generate "out of band" workloads and negatively impact the performance of other containers. In general, these vulnerabilities are difficult to identify, but can be very severe. In this work, we present TORPEDO, a set of modifications to the SYZKALLER fuzzing framework that creates containerized workloads and searches for programs that negatively impact other containers. TORPEDO uses a novel technique that combines resource monitoring with code coverage approximations, and initial testing on common container software has revealed new interesting vulnerabilities and bugs.
Guichard, Jonathan. "Quality Assessment of Conversational Agents : Assessing the Robustness of Conversational Agents to Errors and Lexical Variability." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-226552.
Full textAtt bedöma en konversationsagents språkförståelse är kritiskt, eftersom dåliga användarinteraktioner kan avgöra om agenten blir en framgång eller ett misslyckande redan i början av livscykeln. I denna rapport undersöker vi användningen av parafraser som ett testverktyg för dessa konversationsagenter. Parafraser, vilka är olika sätt att uttrycka samma avsikt, skapas baserat på känd indata genom att utföra lexiska substitutioner och genom att introducera flera stavningsavvikelser. Eftersom det förväntade resultatet för denna indata är känd kan vi använda resultaten för att bedöma agentens robusthet mot språkvariation och upptäcka potentiella förståelssvagheter. Som framgår av en fallstudie får vi uppmuntrande resultat, eftersom detta tillvägagångssätt verkar kunna bidra till att förutse eventuella brister i förståelsen, och dessa brister kan hanteras av de genererade parafraserna.
Lin, Sheng-Xiang, and 林聖翔. "Automatic Web Security Testing with Generative Adversarial Network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/tp3858.
Full text國立宜蘭大學
資訊工程學系碩士班
107
Assessing software security contain many different types of practices. When you have to perform black box testing, fuzzing test is often used for vulnerability mining. However, there is no way to ensure that the target system has been exploited with all the vulnerabilities unless all the unacceptable inputs of the test target have been tested, but this is not possible. Therefore, it is important to improve the efficiency of testing. In the case of web security, for example, when doing testing, engineers usually prepare a large list of attack vectors. Some well-known free vulnerability scanning tools use a list of out-of-the-box attack vectors, while others generate attack vectors based on a known attack format. Although this approach can save a lot of time and labor costs, it just only test problems that have been identified, and sometimes the success rate is not high. To increase the efficiency of security testing, we're hoping to uncover more vulnerabilities by increasing the variability of attack vectors. Therefore, we proposed an automatic security testing system combining generative adversarial network (GAN). Using generating adversarial networks to generate pseudo-data features, the attack vectors can be learned and generated. We can take advantage of that to make a security engineer have second choice to test the website.
(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.
Find full textBook chapters on the topic "Adversarial Testing"
Shetty, Rakshith, Mario Fritz, and Bernt Schiele. "Towards Automated Testing and Robustification by Semantic Adversarial Data Generation." In Computer Vision – ECCV 2020, 489–506. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58536-5_29.
Full textRaj, Sunny, Laura Pullum, Arvind Ramanathan, and Sumit Kumar Jha. "$$\mathcal {SATYA}$$ : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing." In Foundations and Practice of Security, 277–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75650-9_18.
Full textLi, Zuxing, Yang You, and Tobias J. Oechtering. "Privacy Against Adversarial Hypothesis Testing: Theory and Application to Smart Meter Privacy Problem." In Privacy in Dynamical Systems, 43–64. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0493-8_3.
Full textPavanetto, Silvio, and Marco Brambilla. "Generation of Realistic Navigation Paths for Web Site Testing Using Recurrent Neural Networks and Generative Adversarial Neural Networks." In Lecture Notes in Computer Science, 244–58. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50578-3_17.
Full textMelnyk, Virginia Ellyn. "Punch Card Patterns Designed with GAN." In Proceedings of the 2021 DigitalFUTURES, 69–79. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-5983-6_7.
Full textProsvetov, A. V. "Using the Generative Adversarial Network to Generate Recommendations." In Fuzzy Systems and Data Mining VI. IOS Press, 2020. http://dx.doi.org/10.3233/faia200680.
Full textPezzat, Michel, Hector Perez-Meana, Toru Nakashika, and Mariko Nakano. "Many-to-Many Symbolic Multi-Track Music Genre Transfer." In Knowledge Innovation Through Intelligent Software Methodologies, Tools and Techniques. IOS Press, 2020. http://dx.doi.org/10.3233/faia200572.
Full textSaks, Michael J., and Barbara A. Spellman. "Introduction." In The Psychological Foundations of Evidence Law. NYU Press, 2016. http://dx.doi.org/10.18574/nyu/9781479880041.003.0001.
Full textPostal, Karen. "Relationship with Other Experts." In Testimony That Sticks, 362–77. Oxford University Press, 2019. http://dx.doi.org/10.1093/med-psych/9780190467395.003.0016.
Full textWurster, Charles F. "DDT Goes to Trial, Finally, in Washington, DC." In DDT Wars. Oxford University Press, 2015. http://dx.doi.org/10.1093/oso/9780190219413.003.0015.
Full textConference papers on the topic "Adversarial Testing"
Hoque, Md Endadul, Hyojeong Lee, Rahul Potharaju, Charles E. Killian, and Cristina Nita-Rotaru. "Adversarial testing of wireless routing implementations." In the sixth ACM conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2462096.2462120.
Full textBarni, Mauro, and Benedetta Tondi. "Multiple-observation hypothesis testing under adversarial conditions." In 2013 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2013. http://dx.doi.org/10.1109/wifs.2013.6707800.
Full textMcNeil, Martha, and Thomas Llanso. "An Analysis of Adversarial Cyber Testing Practice." In 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174237.
Full textZhang, Peixin, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, and Ting Dai. "White-box fairness testing through adversarial sampling." In ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377811.3380331.
Full textLi, Zuxing, Tobias J. Oechtering, and Deniz Gunduz. "Smart meter privacy based on adversarial hypothesis testing." In 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017. http://dx.doi.org/10.1109/isit.2017.8006633.
Full textGuo, Xiujing. "Towards Automated Software Testing with Generative Adversarial Networks." In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). IEEE, 2021. http://dx.doi.org/10.1109/dsn-s52858.2021.00021.
Full textZhang, Pengcheng, Qiyin Dai, and Shunhui Ji. "Condition-Guided Adversarial Generative Testing for Deep Learning Systems." In 2019 IEEE International Conference On Artificial Intelligence Testing (AITest). IEEE, 2019. http://dx.doi.org/10.1109/aitest.2019.000-5.
Full text"Dropout in Testing Phase Makes Adversarial Samples Generation Difficult." In 2019 the 9th International Workshop on Computer Science and Engineering. WCSE, 2019. http://dx.doi.org/10.18178/wcse.2019.06.017.
Full textKang, Qiao, Jiarong Xing, Yiming Qiu, and Ang Chen. "Probabilistic profiling of stateful data planes for adversarial testing." In ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3445814.3446764.
Full textPark, Hyejin, Taaha Waseem, Wen Qi Teo, Ying Hwei Low, Mei Kuan Lim, and Chun Yong Chong. "Robustness Evaluation of Stacked Generative Adversarial Networks using Metamorphic Testing." In 2021 IEEE/ACM 6th International Workshop on Metamorphic Testing (MET). IEEE, 2021. http://dx.doi.org/10.1109/met52542.2021.00008.
Full textReports on the topic "Adversarial Testing"
Raj, Sunny, Sumit Kumar Jha, Laura L. Pullum, and Arvind Ramanathan. Statistical Hypothesis Testing using CNN Features for Synthesis of Adversarial Counterexamples to Human and Object Detection Vision Systems. Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1361358.
Full text