Data poisoning attacks against machine learning algorithms

Expert Systems with Applications - Tập 208 - Trang 118101 - 2022
Fahri Anıl Yerlikaya1, Şerif Bahtiyar1
1Department of Computer Engineering, Istanbul Technical University, Maslak, Istanbul 34469, Turkey

Tài liệu tham khảo

Al-Zoubi, 2018, Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts, Knowledge-Based Systems, 10.1016/j.knosys.2018.04.025 Bahtiyar, 2019, A multi-dimensional machine learning approach to predict advanced malware, Computer Networks, 160, 118, 10.1016/j.comnet.2019.06.015 Bakhshandeh, 2019 Biggio, 2013, 387 Biggio, 2011, Support vector machines under adversarial label noise., Journal of Machine Learning Research - Proceedings Track, 20, 97 Biggio, 2012 Chakraborty, 2018 Chan, 2017, Data sanitization against adversarial label contamination based on data complexity, International Journal of Machine Learning and Cybernetics, 9 Chan-Hon-Tong, 2018, An algorithm for generating invisible data poisoning using adversarial noise that breaks image classification deep learning, Machine Learning and Knowledge Extraction, 1, 192, 10.3390/make1010011 Chen, 2017, An effective conversation-based botnet detection method, Mathematical Problems in Engineering, 2017, 1, 10.1155/2017/1964165 Chen, 2017, Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach, Computers & Security, 73 Cody, 2015 Dada, 2019, Machine learning for email spam filtering: review, approaches and open research problems, Heliyon, 5, 10.1016/j.heliyon.2019.e01802 D’Angelo, 2019, Malware detection in mobile environments based on autoencoders and api-images, Journal of Parallel and Distributed Computing, 137 Drews, 2019 Duddu, 2018, A survey of adversarial machine learning in cyber warfare, Defence Science Journal, 68, 356, 10.14429/dsj.68.12371 Dunn, 2020, Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things, Sustainability, 12, 6434, 10.3390/su12166434 Frénay, 2014, Classification in the presence of label noise: A survey, IEEE Transactions on Neural Networks and Learning Systems, 25, 845, 10.1109/TNNLS.2013.2292894 Ghosh, 2017 Guo, 2019 Hayes, 2017 Imam, 2019 Jiang, 2018, Credit card fraud detection: A novel approach using aggregation strategy and feedback mechanism, IEEE Internet of Things Journal, 1 Li, 2018 Lim, 2019, Algorithmic decision-making in avs: Understanding ethical and technical concerns for smart cities, Sustainability, 11, 5791, 10.3390/su11205791 Liu, 2020, Privacy and security issues in deep learning: A survey, IEEE Access, 1 Liu, 2016, 1 Mwinyi, 2018, 1 Nassif, 2019, Speech recognition using deep neural networks: A systematic review, IEEE Access, 1 Nelson, 2008 Newell, 2014, On the practicality of integrity attacks on document-level sentiment analysis, Proceedings of the ACM Conference on Computer and Communications Security, 2014, 83 Paudice, 2018 Pitropakis, 2019, A taxonomy and survey of attacks against machine learning, Computer Science Review, 34, 10.1016/j.cosrev.2019.100199 Rubinstein, 2009, 1 Sabherwal, 2019 Su, 2019, One pixel attack for fooling deep neural networks, IEEE Transactions on Evolutionary Computation, 23, 828, 10.1109/TEVC.2019.2890858 Urcuqui López, 2016, 1 Vinod, 2018, A machine learning based approach to detect malicious android apps using discriminant system calls, Future Generation Computer Systems, 94 Wang, 2019, A mobile malware detection method using behavior features in network traffic, Journal of Network and Computer Applications, 133, 10.1016/j.jnca.2018.12.014 Wang, 2019, Botmark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511 Wang, 2014 Wolberg, 2017 Xiao, 2015, Support vector machines under adversarial label contamination, Neurocomputing, 160, 10.1016/j.neucom.2014.08.081 Xiao, 2012, 870 Zhang, 2021, Label flipping attacks against naive bayes on spam filtering systems, Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies Zhou, Y., Kantarcioglu, M., Thuraisingham, B., & Xi, B. (2012). Adversarial support vector machine learning. In Proceedings of the ACM SIGKDD International conference on knowledge discovery and data mining. http://dx.doi.org/10.1145/2339530.2339697. Zügner, 2020, Adversarial attacks on graph neural networks: Perturbations and their patterns, ACM Transactions on Knowledge Discovery from Data, 14, 10.1145/3394520