2023, Volume 7 Issue 2
DATA POISON DETECTION USING MACHINE LEARNING
AUTHOR(S)
Buvaneswari M,Ramalakshmanan Alias Manikandan U, Ram Kumar K, Selvabharathi S
DOI: https://doi.org/10.46647/ijetms.2023.v07i02.066
ABSTRACT
Distributed machine learning (DML) can realize massive dataset training when no single node can work out the accurate results within an acceptable time. However, this will inevitably expose more potential targets to attackers compared with the non-distributed environment. In this paper, we classify DML into basic-DML and semi-DML. In basic-DML, the center server dispatches learning tasks to distributed machines and aggregates their learning results. While in semi-DML, the center server further devotes resources into dataset learning in addition to its duty in basic-DML. We firstly put forward a novel data poison detection scheme for basic-DML, which utilizes a cross-learning mechanism to find out the poisoned data. We prove that the proposed cross-learning mechanism would generate training loops, based on which a mathematical model is established to find the optimal number of training loops. Then, for semi-DML, we present an improved data poison detection scheme to provide better learning protection with the aid of the central resource. To efficiently utilize the system resources, an optimal resource allocation approach is developed. Simulation results show that the proposed scheme can significantly improve the accuracy of the final model by up to 20% for support vector machine and 60% for logistic regression in the basic-DML scenario. Moreover, in the semi-DML scenario, the improved data poison detection scheme with optimal resource allocation can decrease the wasted resources for 20-100%.
Page No: 560 - 571
References:
[1] Jason Brownlee, “What is Deep Learning?” August 16, 2019, https: //machinelearningmastery.com/what-is-deep-learning/
[2] Mathworks, “What Is Deep Learning?” https://www.mathworks.com/di scovery/deep-learning.html
[3] Computer Science, University of Maryland, “Poison Frogs! Targeted Poisoning Attacks on Neural Networks,” https://www.cs.umd.edu/∼tom g/projects/poison/
[4] Keith D. Foote, “A Brief History of Deep Learning,” Feburary 7, 2017, https://www.dataversity.net/brief-history-deep-learning/
[5] Reportlinker, “Global Deeping Learning Industry,” July 2020, https: //www.reportlinker.com/p05798338/Global-Deep-Learning-Industry.h tml?utm source=GNW
[6] Larry Hardesty, “Explained: Neural networks,” April 14, 2017, https: //news.mit.edu/2017/explained-neural-networks-deep-learning-0414
[7] Jeff Dean, “Large-Scale Deep Learning for Intelligent Computer Systems,” https://static.googleusercontent.com/media/research.google.com /en//people/jeff/BayLearn2015.pdf
[8] DeepAI, “Feature Extraction,” https://deepai.org/machine-learning-glos sary-and-terms/feature-extraction
[9] Artem Oppermann, “Artificial Intelligence vs. Machine Learning vs. Deep Learning,” October 29, 2019, https://towardsdatascience.com/artif icial-intelligence-vs-machine-learning-vs-deep-learning-2210ba8cc4ac
[10] Alexander Polyakov, “How to attack Machine Learning (Evasion, Poisoning, Inference, Trojans, Backdoors),” August 6, 2019, https://toward sdatascience.com/how-to-attack-machine-learning-evasion-poisoninginference-trojans-backdoors-a7cb5832595c
[11] Ilja Moisejevs, “Poisoning attacks on Machine Learning,” July 14, 2019, https://towardsdatascience.com/poisoning-attacks-on-machine-learning -1ff247c254db
[12] Daniel Lowd, Christopher Meek, “Good Word Attacks on Statistical Spam Filters,” Semantic Scholar, https://www.semanticscholar.org/pape r/Good-Word-Attacks-on-Statistical-Spam-Filters-Lowd-Meek/16358a 75a3a6561d042e6874d128d82f5b0bd4b3
[13] Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein, “Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks,” in Proceedings of 32nd Conference on Neural Information Processing Systems (NeurIPS 2018), Montreal, Canad, https://papers.nips.cc/paper/7849-po ´ ison-frogs-targeted-clean-label-poisoning-attacks-on-neural-networks.p df
[14] Luis Munoz-Gonz ˜ alez, Battista Biggio, Ambra Demontis, Andrea Pau- ´ dice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli, “Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization,” August 29, 2017, https://arxiv.org/abs/1708.08689
[15] Keras, https://keras.io/
[16] TensorFlow, https://www.tensorflow.org/
How to Cite This Article:
Buvaneswari M,Ramalakshmanan Alias Manikandan U, Ram Kumar K, Selvabharathi S
. DATA POISON DETECTION USING MACHINE LEARNING
. ijetms;7(2):560-571. DOI: 10.46647/ijetms.2023.v07i02.066