Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers
by
Mercuri, Valeria
, Ferretti, Claudio
, Saletta, Martina
in
adversarial examples
/ Algorithms
/ Artificial intelligence
/ Classification
/ Classifiers
/ Cybersecurity
/ Deep learning
/ Evolution
/ evolution strategies
/ evolutionary algorithms
/ Iterative methods
/ Machine learning
/ Methods
/ Neural networks
/ Resilience
/ Security management
/ Software
/ Source code
/ source code analysis
/ vulnerability detection
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers
by
Mercuri, Valeria
, Ferretti, Claudio
, Saletta, Martina
in
adversarial examples
/ Algorithms
/ Artificial intelligence
/ Classification
/ Classifiers
/ Cybersecurity
/ Deep learning
/ Evolution
/ evolution strategies
/ evolutionary algorithms
/ Iterative methods
/ Machine learning
/ Methods
/ Neural networks
/ Resilience
/ Security management
/ Software
/ Source code
/ source code analysis
/ vulnerability detection
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers
by
Mercuri, Valeria
, Ferretti, Claudio
, Saletta, Martina
in
adversarial examples
/ Algorithms
/ Artificial intelligence
/ Classification
/ Classifiers
/ Cybersecurity
/ Deep learning
/ Evolution
/ evolution strategies
/ evolutionary algorithms
/ Iterative methods
/ Machine learning
/ Methods
/ Neural networks
/ Resilience
/ Security management
/ Software
/ Source code
/ source code analysis
/ vulnerability detection
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers
Journal Article
Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers
2023
Request Book From Autostore
and Choose the Collection Method
Overview
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential in identifying vulnerabilities; however, they are not immune to adversarial attacks. This paper presents a set of evolutionary techniques for generating adversarial instances to enhance the resilience of neural models used for vulnerability detection. The proposed approaches leverage an evolution strategy (ES) algorithm that utilizes as the fitness function the output of the neural network to deceive. By starting from existing instances, the algorithm evolves individuals, represented by source code snippets, by applying semantic-preserving transformations, while utilizing the fitness to invert their original classification. This iterative process facilitates the generation of adversarial instances that can mislead the vulnerability detection models while maintaining the original behavior of the source code. The significance of this research lies in its contribution to the field of cybersecurity by addressing the need for enhanced resilience against adversarial attacks in vulnerability detection models. The evolutionary approach provides a systematic framework for generating adversarial instances, allowing for the identification and mitigation of weaknesses in AI classifiers.
MBRLCatalogueRelatedBooks
Related Items
Related Items
We currently cannot retrieve any items related to this title. Kindly check back at a later time.
This website uses cookies to ensure you get the best experience on our website.