Improved Data Poison Detection using Multiple Training Models
DOI:
https://doi.org/10.32628/CSEIT24102101Keywords:
Distributed Machine LearningAbstract
Distributed machine learning (DML) can realize massive dataset training when no single node can work out the accurate results within an acceptable time. However, this will inevitably expose more potential targets to attackers compared with the non-distributed environment. In this paper, we classify DML into basic-DML and semi-DML. In basic-DML, the center server dispatches learning tasks to distributed machines and aggregates their learning results. While in semi-DML, the center server further devotes resources into dataset learning in addition to its duty in basic-DML. We firstly put forward a novel data poison detection scheme for basic-DML, which utilizes a cross-learning mechanism to find out the poisoned data. Then, for semi-DML, we present an improved data poison detection scheme to provide better learning protection with the aid of the central resource. To efficiently utilize the system resources, an optimal resource allocation approach is developed. Simulation results show that the proposed scheme can significantly improve the accuracy of the final model by up to 20% for support vector machine and 60% for logistic regression in the basic-DML scenario.
Downloads
References
Jason Brownlee, “What is Deep Learning?” August 16, 2019, https://machinelearningmastery.com/what-is-deep-learning/
Mathworks, “What Is Deep Learning?” https://www.mathworks.com/di scovery/deeplearning.html
Computer Science, University of Maryland, “Poison Frogs! Targeted Poisoning Attacks on Neural Networks,” https://www.cs.umd.edu/∼tom g/projects/poison/
Keith D. Foote, “A Brief History of Deep Learning,” Feburary 7, 2017, https://www.dataversity.net/brief-history-deep-learning/
Reportlinker, “Global Deeping Learning Industry,” July 2020, https://www.reportlinker.com/p05798338/Global-Deep-Learning-Industry.h tml?utm source=GNW
Larry Hardesty, “Explained: Neural networks,” April 14, 2017, https://news.mit.edu/2017/explained-neural-networks-deep-learning-0414
Jeff Dean, “Large-Scale Deep Learning for Intelligent Computer Systems,”https://static.googleusercontent.com/media/research.google.com/en//people/jeff/BayLearn2015.pdf DOI: https://doi.org/10.1145/2835776.2835844
DeepAI, “Feature Extraction,” https://deepai.org/machine-learning-glos sary-and-terms/featureextraction
Artem Oppermann, “Artificial Intelligence vs. Machine Learning vs. Deep Learning,” October 29, 2019, https://towardsdatascience.com/artif icial-intelligence-vs-machine-learning-vs-deeplearning-2210ba8cc4ac
Alexander Polyakov, “How to attack Machine Learning (Evasion, Poisoning, Inference, Trojans, Backdoors),” August 6, 2019, https://toward sdatascience.com/how-to-attack-machine-learningevasion-poisoninginference-trojans-backdoors-a7cb5832595c
Ilja Moisejevs, “Poisoning attacks on Machine Learning,” July 14, 2019, https://towardsdatascience.com/poisoning-attacks-on-machine-learning -1ff247c254db
Daniel Lowd, Christopher Meek, “Good Word Attacks on Statistical Spam Filters,” Semantic Scholar, https://www.semanticscholar.org/pape r/Good-Word-Attacks-on-Statistical-Spam-FiltersLowd-Meek/16358a 75a3a6561d042e6874d128d82f5b0bd4b3
Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein, “Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks,” in Proceedings of 32nd Conference on Neural Information Processing Systems (NeurIPS 2018), Montreal, Canad, https://papers.nips.cc/paper/7849-po ´ ison-frogs-targeted-clean-labelpoisoning-attacks-on-neural-networks.p df
Luis Munoz-Gonz ˜ alez, Battista Biggio, Ambra Demontis, Andrea Pau- ´ dice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli, “Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization,” August 29, 2017, https://arxiv.org/abs/1708.08689 DOI: https://doi.org/10.1145/3128572.3140451
Keras, https://keras.io/
TensorFlow, https://www.tensorflow.org
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.