SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

Machine learning are vulnerable to the threats. The Intruders can utilize the malicious nature of the nodes to attack the training dataset to worsen the process and manipulate the learning and make the over all system with less efficiency and performance. The optimized poison attack procedures are a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Expert systems 2023-06, Vol.40 (5), p.n/a
Hauptverfasser: Manoharan, Poongodi, Walia, Ranjan, Iwendi, Celestine, Ahanger, Tariq Ahamed, Suganthi, S. T., Kamruzzaman, M. M., Bourouis, Sami, Alhakami, Wajdi, Hamdi, Mounir
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Machine learning are vulnerable to the threats. The Intruders can utilize the malicious nature of the nodes to attack the training dataset to worsen the process and manipulate the learning and make the over all system with less efficiency and performance. The optimized poison attack procedures are already introduced to estimate the overall bad scenario, design the intrusion as bi‐level optimization and it is considered computational complexity is high and demanding, in contrary the applicability is limited such models deep neural networks. In this research papers, we have proposed, novel proposed system, poisoning attacks against the Machine learning training dataset, including the genuine data points that reduce the accuracy of the classifier in the process of training. The proposed system have 3 components of Generative Adverserial networks (GAN) generator, discriminator, and the target classifier. The proposed system allows to detect the vulnerability easy and it can be found as similar as realistic attacks to detect the area where the underlying data distribution have more possibility of poising attack which cause vulnerability to the network. Our experimentation, proves the claim our that the proposed model is effective on compromising the classifiers uses the machine learning algorithms and also deep learning networks.
ISSN:0266-4720
1468-0394
DOI:10.1111/exsy.13072