Analysis on Security Evaluation of Pattern Classifiers under Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering. In these applications data can be purposely manipulated by humans to undermine their operation. This adversarial scenario’s exploitation may sometimes affect their performance, systems may exhibit vulnerabilities and limit their practical utility. This adversarial scenario is not taken into account by classical design methods. These Applications have an intrinsic adversarial nature since the input data can be purposely manipulated by an intelligent and adaptive adversary to undermine classifier operation. This often gives rise to an arms race between the adversary and the classifier designer. The system evaluates at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. A generalize framework is used for evaluation of classifier security that formalizes and generalizes the training and testing datasets, to discriminate between a “legitimate” and a “malicious” pattern class Training and Testing sets have been obtained from distribution using a classical reassembling technique like bootstrapping or cross validation. Security evaluation can be carried out by averaging the performance of the trained and tested data.
Authors and Affiliations
Rupali B. Navalkar, Prof. Rajeshri R. Shelke
Battery Health Monitoring System with State Of Charge Estimation Using Artificial Neural Network
Today Battery is an essential component of all critical electrical systems. Battery stores chemical, not electricity. Two different lead in an acid mixture react to produce an electrical pressure. This electrochemical r...
Design of Fractional order Recursive Digital Differentiator using Continued Fraction Expansion
In this paper, new discretized models of fractional order differentiator (FOD) based on different operators are proposed. Specifically in this work, one-third and one-fourth order differentiator models based on Simpson...
An Efficient Algorithm for Approximate String Matching
The approximate string matching is the technique of finding strings that match a pattern approximately (rather than exactly). Most often when we need to match a pattern exact matching is not possible, due to insufficien...
Brain Computer Interface
A BRAIN COMPUTER INTERFACE (BCI) is a direct communication pathway between the brain and an external device. The concept of BCI had coined in 1970s at the University of California Los Angeles (UCLA). Growth in neurosci...
Influence of Curing Types on Properties of Concrete Using Slag Replacement
The influence of curing types on properties of concrete along with different percentage of cement replacement is studied. Air curing and accelerated curing are compared to water curing. Four types of mixes (i.e., with d...