Analysis on Security Evaluation of Pattern Classifiers under Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering. In these applications data can be purposely manipulated by humans to undermine their operation. This adversarial scenario’s exploitation may sometimes affect their performance, systems may exhibit vulnerabilities and limit their practical utility. This adversarial scenario is not taken into account by classical design methods. These Applications have an intrinsic adversarial nature since the input data can be purposely manipulated by an intelligent and adaptive adversary to undermine classifier operation. This often gives rise to an arms race between the adversary and the classifier designer. The system evaluates at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. A generalize framework is used for evaluation of classifier security that formalizes and generalizes the training and testing datasets, to discriminate between a “legitimate” and a “malicious” pattern class Training and Testing sets have been obtained from distribution using a classical reassembling technique like bootstrapping or cross validation. Security evaluation can be carried out by averaging the performance of the trained and tested data.
Authors and Affiliations
Rupali B. Navalkar, Prof. Rajeshri R. Shelke
An Efficient Technique for Fingerprint Features Protection and Person Identification Using Wavelet Transform
Fingerprint recognition is a widely used technique for person identification. The two major techniques for fingerprint identification are minutiae based technique and non-minutiae based technique. In this paper we propo...
Overview of Image Processing
Image Processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-today life for various applications. Image processing...
Big Data Analysis and Its Tools – A Review
The term Big Data is blooming very much these days, in this new era of large data sets, it has became a challenge for the organization for its storage and processing. The massive volume of data which is also referred to...
Productivity enhancement of Trimdek using Guard Film Roller Stand and Auto-Stacker
This paper addresses the productivity enhancement of Trimdek profile using Guard Film Roller Stand and Auto Stacker. It also consider the topic of formation of trimdek (square-fluted steel cladding) by TRFM (Trimdek Rol...
slugTime Based Messenger- An Android Application
The developed application is time based i.e the user can select the desired time limit (say x is starting limit and y is ending limit) and when the application is opened it automatically goes to the silent mode and when...