Defending via strategic ML selection
arXiv: Cryptography and Security, 2019.
The results of a learning process depend on the input data. There are cases in which an adversary can strategically tamper with the input data to affect the outcome of the learning process. While some datasets are difficult to attack, many others are susceptible to manipulation. A resourceful attacker can tamper with large portions of the...More
PPT (Upload PPT)