Active Machine Learning Adversarial Attack Detection in the User Feedback Process

نویسندگان

چکیده

Modern Information and Communication Technology (ICT)-based applications utilize current technological advancements for purposes of streaming data, as a way adapting to the ever-changing landscape. Such efforts require providing accurate, meaningful, trustworthy output from sensors particularly during dynamic virtual sensing. However, ensure that sensing ecosystem is devoid any sensor threats or active attacks, it paramount implement secure real-time strategies. Fundamentally, detection adversarial attacks/instances User Feedback Process (UFP) key forecasting potential attacks in learning. Also, according existing literature, there lacks comprehensive study has focus on an machine learning perspective at time writing this paper. Therefore, authors posit importance detecting strategy. Attack context paper through UFP-Threat driven model been presented action exerts alteration system data. To achieve this, employed ambient data collected smart environment human activity recognition (Continuous Ambient Sensors Dataset, CASA) with fully labeled connections, where we intentionally subject Dataset wrong labels targeted/manipulative attack (by malevolent labeler) UFP, assumption user-labels were connected unique identities. While dataset's classify tasks predict activities, our gives strategies information security point view. Furthermore, modeling have using Meta Language (MAL) compiler detection. The findings experiments conducted shown identification profiling UFP could significantly increase accuracy process high degree certainty paves towards automated approaches Internet Cognitive Things (ICoT).

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning

As the prevalence and everyday use of machine learning algorithms, along with our reliance on these algorithms grow dramatically, so do the efforts to attack and undermine these algorithms with malicious intent, resulting in a growing interest in adversarial machine learning. A number of approaches have been developed that can render a machine learning algorithm ineffective through poisoning or...

متن کامل

Generative Adversarial Active Learning

We propose a new active learning by query synthesis approach using Generative Adversarial Networks (GAN). Different from regular active learning, the resulting algorithm adaptively synthesizes training instances for querying to increase learning speed. We generate queries according to the uncertainty principle, but our idea can work with other active learning principles. We report results from ...

متن کامل

Learning from User Feedback for Machine Translation in Real-Time

Post-editing is the most popular approach to improve accuracy and speed of human translators by applying the machine translation (MT) technology. During the translation process, human translators generate the translation by correcting MT outputs in the post-editing scenario. To avoid repeating the same MT errors, in this paper, we propose an efficient framework to update MT in real-time by lear...

متن کامل

Foundations of Adversarial Machine Learning

As classifiers are deployed to detect malicious behavior ranging from spam to terrorism, adversaries modify their behaviors to avoid detection (e.g., [4, 3, 6]). This makes the very behavior the classifier is trying to detect a function of the classifier itself. Learners that account for concept drift (e.g., [5]) are not sufficient since they do not allow the change in concept to depend on the ...

متن کامل

Learning to Attack: Adversarial Transformation Networks

With the rapidly increasing popularity of deep neural networks for image recognition tasks, a parallel interest in generating adversarial examples to attack the trained models has arisen. To date, these approaches have involved either directly computing gradients with respect to the image pixels or directly solving an optimization on the image pixels. We generalize this pursuit in a novel direc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3063002