Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality1 | part of Game Theory and Machine Learning for Cyber Security | Wiley-IEEE Press books | IEEE Xplore