Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis.
Mst. Shapna AkterHossain ShahriarIysa IqbalMD HossainM. A. KarimVictor ClincyRazvan VoicuPublished in: CoRR (2023)
Keyphrases
- machine learning
- machine learning methods
- data mining
- knowledge acquisition
- information extraction
- text mining
- decision trees
- pattern recognition
- active learning
- explanation based learning
- machine learning algorithms
- natural language processing
- knowledge discovery
- machine learning approaches
- inductive logic programming
- model selection
- multi agent
- reinforcement learning
- text classification
- knowledge representation
- computer science
- computer vision
- artificial intelligence
- information retrieval
- security vulnerabilities