SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
P Manoharan, R Walia, C Iwendi, TA Ahanger, ST Suganthi, MM Kamruzzaman, S Bourouis
Expert Systems, 2023Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and
manipulate the learning and make the over all system with less efficiency and performance.
The optimized poison attack procedures are already introduced to estimate the overall bad
scenario, design the intrusion as bi‐level optimization and it is considered computational
complexity is high and demanding, in contrary the applicability is limited such models deep …
Abstract
Machine learning are vulnerable to the threats. The Intruders can utilize the malicious nature of the nodes to attack the training dataset to worsen the process and manipulate the learning and make the over all system with less efficiency and performance. The optimized poison attack procedures are already introduced to estimate the overall bad scenario, design the intrusion as bi‐level optimization and it is considered computational complexity is high and demanding, in contrary the applicability is limited such models deep neural networks. In this research papers, we have proposed, novel proposed system, poisoning attacks against the Machine learning training dataset, including the genuine data points that reduce the accuracy of the classifier in the process of training. The proposed system have 3 components of Generative Adverserial networks (GAN) generator, discriminator, and the target classifier. The proposed system allows to detect the vulnerability easy and it can be found as similar as realistic attacks to detect the area where the underlying data distribution have more possibility of poising attack which cause vulnerability to the network. Our experimentation, proves the claim our that the proposed model is effective on compromising the classifiers uses the machine learning algorithms and also deep learning networks.
Wiley Online Library
以上显示的是最相近的搜索结果。 查看全部搜索结果