Machine Learning Data Detection Poisoning Attacks Using Resource Schemes Multi-Linear Regression

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

As machine learning becomes widely used for automated decisions, attackers have strong incentives to manipulate the results and models generated by machine learning algorithms. In this paper, we perform the first systematic study of poisoning attacks and their countermeasures for linear regression models. In poisoning attacks, attackers deliberately influence the training data to manipulate the...

متن کامل

Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning

Deep learning models have achieved high performance on many tasks, and thus have been applied to many security-critical scenarios. For example, deep learning-based face recognition systems have been used to authenticate users to access many security-sensitive applications like payment apps. Such usages of deep learning systems provide the adversaries with sufficient incentives to perform attack...

متن کامل

Detection of Probe Attacks Using Machine Learning Techniques

In recent years, the number of attacks on the computer networks and its components are getting increasing. To protect from these attacks various Intrusion detection techniques have been used. Intrusion Detection System (IDS) is a system which collects and analyzes the information from the network to identify various attacks made against the components of a network. In this paper we presented a ...

متن کامل

Some Submodular Data-Poisoning Attacks on Machine Learners

The security community has long recognized the threats of data-poisoning attacks (a.k.a. causative attacks) on machine learning systems [1–6, 9, 10, 12, 16], where an attacker modifies the training data, so that the learning algorithm arrives at a “wrong” model that is useful to the attacker. To quantify the capacity and limits of such attacks, we need to know first how the attacker may modify ...

متن کامل

A Review on Malware Detection Schemes Using Machine Learning Techniques

Malware is a one type of software which can harm the computer’s operating system and it may also steal the personal information from the computer. Malware can be made by using any programming language by the programmer. It is very difficult to define a malware with a single term or a single name. A malware can be considered as a malicious software or malcode or it is also known as a malicious c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Neural, Parallel, & Scientific Computations

سال: 2020

ISSN: 1061-5369

DOI: 10.46719/npsc20202821