Analysis on Security Evaluation of Pattern Classifiers under Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering. In these applications data can be purposely manipulated by humans to undermine their operation. This adversarial scenario’s exploitation may sometimes affect their performance, systems may exhibit vulnerabilities and limit their practical utility. This adversarial scenario is not taken into account by classical design methods. These Applications have an intrinsic adversarial nature since the input data can be purposely manipulated by an intelligent and adaptive adversary to undermine classifier operation. This often gives rise to an arms race between the adversary and the classifier designer. The system evaluates at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. A generalize framework is used for evaluation of classifier security that formalizes and generalizes the training and testing datasets, to discriminate between a “legitimate” and a “malicious” pattern class Training and Testing sets have been obtained from distribution using a classical reassembling technique like bootstrapping or cross validation. Security evaluation can be carried out by averaging the performance of the trained and tested data.
Authors and Affiliations
Rupali B. Navalkar, Prof. Rajeshri R. Shelke
Utilization of Copper Slag in Bituminous Concrete with a Stone Dust and Flyash as a Filler Material
In this paper an attempt has been made to utilize the copper slag, stone dust and fly ash in bituminous concrete. The copper slag is produced as waste from roasting of copper, in which sulphur is eliminated. Copper slag...
A Note on an Upper Bound for (n, d)
In this correspondence, we have to obtain an upper bound for the value of (n,d), we have related to the bounds on the number of code words in a linear code C of length n. In particular we have given the exact inequality...
Technology Up gradation of GDC Machine Using Messung PLC
Under the present regime of globalization and liberalization, quality enhancement and cost reduction are two major steps to enhance productivity in major industries. We focused on the very practical, safe, economical an...
Constant Power Generation from Wind Turbine by Wind Tracking
Now-a-days the Generation of Electrical Energy is increasing by using of Renewable energy resources. Among those wind power generation is mostly preferred because it does not emit any hazardous gases and doesn’t need an...
An Overview on 5G Technology of Mobile Communication
The goal of this paper is thorough review identified with 5G innovation of portable correspondence. Existing exploration work in portable correspondence is identified with 5G innovation. In 5G, explores are identified w...