A Tutorial of Adversarial Learning
نویسنده
چکیده
Just for fun, far from complete. 1 Problem Definition We define x ∈ X as an instance, where X is the instance space. x is represented by a vector variable with n dimensions, namely x = (x1, . . . , xn). xi denotes the ith feature in instance x. Each instance can belong to one of two classes: positive (malicious) or negative (innocent), which are denoted by x and x respectively. Let training set S ⊂ X and test set T ⊂ X consist of both positive and negative instances. In practice, S is usually a finite set, whereas T = X \ S has infinite size. We call a function C : X 7→ {−1, 1} as a Boolean classifier, or a classifier for short. We refer to x for which C(x) = 1 and x for which C(x) = −1. The task of a classifier is to learn from S a function C(x) that will correctly predict new instance x ∈ T . Obviously, a well-performed classifier can secure the system by detecting malicious instances in advance (e.g. spam filtering and virus detection). An adversary attempts to defeat the system by sending malicious instances without being detected. In fact, adversaries are actively disguising their behavior to evade detection. For instance, senders of junk email often add “good” words or sentences to cheat the spam filter for decreasing the likelihood of detection. Although these disguised instances are more indicative of innocent than malicious, they may also decrease the reward of adversary due to their ineffectiveness. For adversary, some instances are more effective than others. We explain such differences on utility by an adversarial cost function A(x) 7→ R. Note, that A(x) is domain-dependent function. We assume that adversaries have a base instance x for which C(x) = 1 on hand. To evade detection, they are interested in finding an instance x ∗ that most similar to x but will be classified as negative. To measure the similarity between two instances, we first define an adversarial cost function as A(x) = n ∑ i=1 ai|xi − x a i |, where positive scalars1 ai represent the relative cost of changing each feature, allowing that some features may be more important than others (from adversaries’ perspective of view). An illustrative example is depicted in Figure 1. 1 The positive scalar ai is under an assumption that x is the best instance as far as the adversary knows. That is, any changes to x costs an utility loss.
منابع مشابه
Development and Usability Evaluation of an Online Tutorial for “How to Write a Proposal” for Medical Sciences Students
Background and Objective: Considering the importance of learning how to write a proposal for students, this study was performed to develop an online tutorial for “How to write a Proposal” for students and to evaluate its usability. Methods: This study is a developmental research and tool design. “Gamified Online Tutorial based on Self-Determination Theory (GOT-STD) Framework" became the basis f...
متن کاملImprovement of generative adversarial networks for automatic text-to-image generation
This research is related to the use of deep learning tools and image processing technology in the automatic generation of images from text. Previous researches have used one sentence to produce images. In this research, a memory-based hierarchical model is presented that uses three different descriptions that are presented in the form of sentences to produce and improve the image. The proposed ...
متن کاملNIPS 2016 Tutorial: Generative Adversarial Networks
This report summarizes the tutorial presented by the author at NIPS 2016 on generative adversarial networks (GANs). The tutorial describes: (1) Why generative modeling is a topic worth studying, (2) how generative models work, and how GANs compare to other generative models, (3) the details of how GANs work, (4) research frontiers in GANs, and (5) state-of-the-art image models that combine GANs...
متن کاملComparison of efficiency management training using lecturing and small group teaching on learning rate of Nursing and Midwifery student’s
Abstract Introduction: Teaching principles of management is important because it empowers the students in the field of midwifery and nursing. This aspect would improve the quality of care in health system significantly. Therefore, achieving the potential teaching method is great importance. This strategy involves techniques to facilitate the learning process and growth critical thinking in s...
متن کاملElicitation, Recast, and Meta-Linguistic Feedback in Form-Focused Exchanges: Effects of Feedback Modality on Multimedia Grammar Instruction
This research explores the effects of three computer-mediated feedback modalities, that is, elicitation, recast, and meta-linguistics, on the learning of English participial, gerund, and infinitival phrases among Iranian intermediate-level EFL learners. The overriding focus of the present study was to investigate whether different types of feedback given through form-focused computer-human exch...
متن کاملALICE: Towards Understanding Adversarial Learning for Joint Distribution Matching
We investigate the non-identifiability issues associated with bidirectional adversarial training for joint distribution matching. Within a framework of conditional entropy, we propose both adversarial and non-adversarial approaches to learn desirable matched joint distributions for unsupervised and supervised tasks. We unify a broad family of adversarial models as joint distribution matching pr...
متن کامل