Defending the Integrity of Machine Learning Models in the Face of Adversarial Threats

Author:

Roy Hrittick1,Anand Sourabh1

Affiliation:

1. University School of Information, Communication and Technology Guru Gobind Singh Indraprastha University

Abstract

Abstract The primary objective of the research is to examine the resilience of models based on machine learning when confronted with adversarial threats. The focus will be on developing effective strategies to safeguard the integrity of these models. This study employs a carefully designed framework to undertake the task of simulating adversarial attacks on machine learning models. The central objective of the research centres on the intentional manipulation of numerical variables in order to accurately simulate real-world threats. The investigation of statistical analyses, such as t-tests and comprehensive data visualisations, enables the evaluation of the impact exerted by adversarial attacks on both data distributions and model outputs. The primary objective of the current investigation is to assess the effectiveness of a mimicked defence mechanism in the domain of machine learning model restoration, with the ultimate goal of preserving model integrity. The results gathered by our study emphasise the significant significance of adversarial threats, thereby underscoring the need for a comprehensive analysis of robust defence strategies. The analysis of correlation matrices, both before and after adversarial attacks, provides valuable insights into the changes in the fundamental structure induced by these interventions. The current investigation offers valuable insights into the preservation of the integrity of machine learning models and suggests possible ways to enhance their resilience against ever-changing adversarial tactics.

Publisher

Research Square Platform LLC

Reference10 articles.

1. Adversarial machine learning attacks and defense methods in the cyber security domain;Rosenberg I;ACM Computing Surveys (CSUR),2021

2. Machine learning security: Threats, countermeasures, and evaluations;Xue M;IEEE Access,2020

3. A survey on security threats and defensive techniques of machine learning: A data driven view;Liu Q;IEEE access,2018

4. Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., & Mukhopadhyay, D. (2018). Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069.

5. Adversarial examples: Attacks and defenses for deep learning;Yuan X;IEEE transactions on neural networks and learning systems,2019

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3