메뉴 건너뛰기




Volumn 28, Issue 7, 2014, Pages

Pattern recognition systems under attack: Design issues and research challenges

Author keywords

Adversarial learning; Robust classification; Secure pattern recognition

Indexed keywords

LEARNING ALGORITHMS; MALWARE; PATTERN RECOGNITION;

EID: 84988423255     PISSN: 02180014     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218001414600027     Document Type: Article
Times cited : (95)

References (74)
  • 1
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • T. Kanade, A. K. Jain and N. K. Ratha, LNCS, Springer
    • A. Adler, Vulnerabilities in biometric encryption systems, 5th Int. Conf. Audio- and Video-Based Biometric Person Authentication, eds. T. Kanade, A. K. Jain and N. K. Ratha, LNCS, Vol. 3546(Springer, 2005), pp. 1100-1109.
    • (2005) 5th Int. Conf. Audio- and Video-based Biometric Person Authentication , vol.3546 , pp. 1100-1109
    • Adler, A.1
  • 3
    • 3042745793 scopus 로고    scopus 로고
    • The weakest link revisited
    • I. Arce, The weakest link revisited, IEEE Security Privacy 1 (2) (2003) 72-76.
    • (2003) IEEE Security Privacy , vol.1 , Issue.2 , pp. 72-76
    • Arce, I.1
  • 4
    • 84878115018 scopus 로고    scopus 로고
    • A survey of image spamming and -ltering techniques
    • A. Attar, R. M. Rad and R. E. Atani, A survey of image spamming and -ltering techniques, Artif. Intell. Rev. 40 (1) (2013) 71-105.
    • (2013) Artif. Intell. Rev. , vol.40 , Issue.1 , pp. 71-105
    • Attar, A.1    Rad, R.M.2    Atani, R.E.3
  • 8
    • 84866671111 scopus 로고    scopus 로고
    • Security evaluation of biometric authentication systems under real spoo-ng attacks
    • B. Biggio, Z. Akhtar, G. Fumera, G. L. Marcialis and F. Roli, Security evaluation of biometric authentication systems under real spoo-ng attacks, IET Biometrics 1 (1) (2012) 11-24.
    • (2012) IET Biometrics , vol.1 , Issue.1 , pp. 11-24
    • Biggio, B.1    Akhtar, Z.2    Fumera, G.3    Marcialis, G.L.4    Roli, F.5
  • 9
    • 80053015779 scopus 로고    scopus 로고
    • Bagging classiers for-ghting poisoning attacks in adversarial environments
    • C. Sansone et al., LNCS, Springer
    • B. Biggio, I. Corona, G. Fumera, G. Giacinto and F. Roli, Bagging classiers for-ghting poisoning attacks in adversarial environments, in 10th Int. Workshop on MCSs, eds. C. Sansone et al., LNCS, Vol. 6713(Springer, 2011), pp. 350-359.
    • (2011) 10th Int. Workshop on MCSs , vol.6713 , pp. 350-359
    • Biggio, B.1    Corona, I.2    Fumera, G.3    Giacinto, G.4    Roli, F.5
  • 13
    • 79956346771 scopus 로고    scopus 로고
    • A survey and experimental evaluation of image spamltering techniques
    • B. Biggio, G. Fumera, I. Pillai and F. Roli, A survey and experimental evaluation of image spamltering techniques, Pattern Recogn. Lett. 32 (10) (2011) 1436-1446.
    • (2011) Pattern Recogn. Lett. , vol.32 , Issue.10 , pp. 1436-1446
    • Biggio, B.1    Fumera, G.2    Pillai, I.3    Roli, F.4
  • 15
    • 70350241126 scopus 로고    scopus 로고
    • Evade hard multiple classi-er systems
    • O. Okun and G. Valentini, Studies in Computational Intell, Springer
    • B. Biggio, G. Fumera and F. Roli, Evade hard multiple classi-er systems, in Supervised and Unsupervised Ensemble Methods and their Applications, eds. O. Okun and G. Valentini, Vol. 245, Studies in Computational Intell. (Springer, 2009), pp. 15-38.
    • (2009) Supervised and Unsupervised Ensemble Methods and Their Applications , vol.245 , pp. 15-38
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 16
    • 70349319703 scopus 로고    scopus 로고
    • Multiple classifier systems for adversarial classification tasks
    • J. A. Benediktsson, J. Kittler and F. Roli, LNCS, Springer
    • B. Biggio, G. Fumera and F. Roli, Multiple classifier systems for adversarial classification tasks, Proc. 8th Int. Workshop on MCSs, eds. J. A. Benediktsson, J. Kittler and F. Roli, LNCS, Vol. 5519(Springer, 2009), pp. 132-141.
    • (2009) Proc. 8th Int. Workshop on MCSs , vol.5519 , pp. 132-141
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 17
    • 79952315022 scopus 로고    scopus 로고
    • Multiple classifier systems for robust classifier design in adversarial environments
    • B. Biggio, G. Fumera and F. Roli, Multiple classifier systems for robust classifier design in adversarial environments, Int. J. Mach. Learn. Cybern. 1 (1) (2010) 27-41.
    • (2010) Int. J. Mach. Learn. Cybern. , vol.1 , Issue.1 , pp. 27-41
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 18
    • 77952042088 scopus 로고    scopus 로고
    • Multiple classifier systems under attack
    • N. E. Gayar et al., LNCS, Springer
    • B. Biggio, G. Fumera and F. Roli, Multiple classifier systems under attack, in 9th Int. Workshop on MCSs, eds. N. E. Gayar et al., LNCS, Vol. 5997(Springer, 2010), pp. 74-83.
    • (2010) 9th Int. Workshop on MCSs , vol.5997 , pp. 74-83
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 20
    • 84992268362 scopus 로고    scopus 로고
    • Security evaluation of pattern classifiers under attack
    • B. Biggio, G. Fumera and F. Roli, Security evaluation of pattern classifiers under attack, IEEE Trans. Knowl. Data Eng. 26 (4) (2014) 984-996.
    • (2014) IEEE Trans. Knowl. Data Eng. , vol.26 , Issue.4 , pp. 984-996
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 22
    • 84867136631 scopus 로고    scopus 로고
    • Poisoning attacks against support vector machines
    • J. Langford et al, Omnipress
    • B. Biggio, B. Nelson and P. Laskov, Poisoning attacks against support vector machines, 29th Int. Conf. Mach. Learn., eds. J. Langford et al. (Omnipress, 2012), pp. 1807-1814.
    • (2012) 29th Int. Conf. Mach. Learn. , pp. 1807-1814
    • Biggio, B.1    Nelson, B.2    Laskov, P.3
  • 24
    • 84869200775 scopus 로고    scopus 로고
    • Static prediction games for adversarial learning problems
    • M. Brückner, C. Kanzow and T. Scheffer, Static prediction games for adversarial learning problems, J. Mach. Learn. Res. 13 (2012) 2617-2654.
    • (2012) J. Mach. Learn. Res. , vol.13 , pp. 2617-2654
    • Brückner, M.1    Kanzow, C.2    Scheffer, T.3
  • 25
  • 27
    • 18244390064 scopus 로고    scopus 로고
    • On robust properties of convex risk minimization methods for pattern recognition
    • A. Christmann and I. Steinwart, On robust properties of convex risk minimization methods for pattern recognition, J. Mach. Learn. Res. 5 (2004) 1007-1034.
    • (2004) J. Mach. Learn. Res. , vol.5 , pp. 1007-1034
    • Christmann, A.1    Steinwart, I.2
  • 29
    • 34248577801 scopus 로고    scopus 로고
    • Algorithms for projection - Pursuit robust principal component analysis
    • C. Croux, P. Filzmoser and M. R. Oliveira, Algorithms for projection - pursuit robust principal component analysis, Chemometr. Intell. Lab. Syst. 87 (2) (2007) 218-225.
    • (2007) Chemometr. Intell. Lab. Syst. , vol.87 , Issue.2 , pp. 218-225
    • Croux, C.1    Filzmoser, P.2    Oliveira, M.R.3
  • 30
    • 85008536972 scopus 로고    scopus 로고
    • Security analytics and measurements
    • G. Cybenko and C. E. Landwehr, Security analytics and measurements, IEEE Security Privacy 10 (3) (2012) 5-8.
    • (2012) IEEE Security Privacy , vol.10 , Issue.3 , pp. 5-8
    • Cybenko, G.1    Landwehr, C.E.2
  • 32
    • 78049529865 scopus 로고    scopus 로고
    • Learning to classify with missing and corrupted features
    • O. Dekel, O. Shamir and L. Xiao, Learning to classify with missing and corrupted features, Mach. Learn. 81 (2010) 149-178.
    • (2010) Mach. Learn. , vol.81 , pp. 149-178
    • Dekel, O.1    Shamir, O.2    Xiao, L.3
  • 36
    • 70449713306 scopus 로고    scopus 로고
    • On the vulnerability of face verification systems to hill-climbing attacks
    • J. Galbally, C. McCool, J. Fierrez, S. Marcel and J. Ortega-Garcia, On the vulnerability of face verification systems to hill-climbing attacks, Pattern Recogn. 43 (3) (2010) 1027-1038.
    • (2010) Pattern Recogn. , vol.43 , Issue.3 , pp. 1027-1038
    • Galbally, J.1    McCool, C.2    Fierrez, J.3    Marcel, S.4    Ortega-Garcia, J.5
  • 37
    • 33749242256 scopus 로고    scopus 로고
    • Nightmare at test time: Robust learning by feature deletion
    • W. W. Cohen and A. Moore, ACM
    • A. Globerson and S. T. Roweis, Nightmare at test time: Robust learning by feature deletion, Proc. 23rd Int. Conf. Mach. Learn., eds. W. W. Cohen and A. Moore, Vol. 148(ACM, 2006), pp. 353-360.
    • (2006) Proc. 23rd Int. Conf. Mach. Learn. , vol.148 , pp. 353-360
    • Globerson, A.1    Roweis, S.T.2
  • 43
    • 84876950829 scopus 로고    scopus 로고
    • Abusing file processing in malware detectors for fun and profit
    • S. Jana and V. Shmatikov, Abusing file processing in malware detectors for fun and profit, Proc. 33rd IEEE Symp. Sec. & Privacy (2012), pp. 80-94.
    • (2012) Proc. 33rd IEEE Symp. Sec. & Privacy , pp. 80-94
    • Jana, S.1    Shmatikov, V.2
  • 44
    • 84922860136 scopus 로고    scopus 로고
    • Machine learning methods for computer security (Dagstuhl Perspectives Workshop 12371)
    • A. D. Joseph, P. Laskov, F. Roli, J. D. Tygar and B. Nelson, Machine learning methods for computer security (Dagstuhl Perspectives Workshop 12371), Dagstuhl Manifestos 3 (1) (2013) 1-30.
    • (2013) Dagstuhl Manifestos , vol.3 , Issue.1 , pp. 1-30
    • Joseph, A.D.1    Laskov, P.2    Roli, F.3    Tygar, J.D.4    Nelson, B.5
  • 45
    • 84988398412 scopus 로고    scopus 로고
    • Classifier evaluation and attribute selection against active adversaries
    • M. Kantarcioglu, B. Xi and C. Clifton, Classifier evaluation and attribute selection against active adversaries, Data Mining Knowl. Discov. (2010), pp. 1-45.
    • (2010) Data Mining Knowl. Discov. , pp. 1-45
    • Kantarcioglu, M.1    Xi, B.2    Clifton, C.3
  • 47
    • 84904807829 scopus 로고    scopus 로고
    • Feature weighting for improved classifier robustness
    • Mountain View, CA, USA
    • A. Kolcz and C. H. Teo, Feature weighting for improved classifier robustness, in 6th Conf. Email and Anti-Spam (Mountain View, CA, USA, 2009), pp. 1-8.
    • (2009) 6th Conf. Email and Anti-Spam , pp. 1-8
    • Kolcz, A.1    Teo, C.H.2
  • 48
    • 70349310717 scopus 로고    scopus 로고
    • Classifier ensembles for detecting concept change in streaming data: Overview and perspectives
    • O. Okun and G. Valentini, Patras, Greece
    • L. I. Kuncheva, Classifier ensembles for detecting concept change in streaming data: Overview and perspectives, in Workshop on Supervised and Unsupervised Ensemble Methods and their Applications, eds. O. Okun and G. Valentini (Patras, Greece, 2008), pp. 5-10.
    • (2008) Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications , pp. 5-10
    • Kuncheva, L.I.1
  • 49
    • 77955660961 scopus 로고    scopus 로고
    • Mining adversarial patterns via regularized loss minimization
    • W. Liu and S. Chawla, Mining adversarial patterns via regularized loss minimization, Mach. Learn. 81 (1) (2010) 69-83.
    • (2010) Mach. Learn. , vol.81 , Issue.1 , pp. 69-83
    • Liu, W.1    Chawla, S.2
  • 51
    • 65449142381 scopus 로고    scopus 로고
    • Good word attacks on statistical spam filters
    • Mountain View, CA, USA
    • D. Lowd and C. Meek, Good word attacks on statistical spam filters, 2nd Conf. Email and Anti-Spam (Mountain View, CA, USA, 2005), pp. 1-8.
    • (2005) 2nd Conf. Email and Anti-Spam , pp. 1-8
    • Lowd, D.1    Meek, C.2
  • 52
    • 84877998967 scopus 로고    scopus 로고
    • Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection
    • ACM
    • D. Maiorca, I. Corona and G. Giacinto, Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection, Proc. 8th Symp. Inform., Comp. and Comm. Sec., ASIACCS'13(ACM, 2013), pp. 119-130.
    • (2013) Proc. 8th Symp. Inform., Comp. and Comm. Sec., ASIACCS'13 , pp. 119-130
    • Maiorca, D.1    Corona, I.2    Giacinto, G.3
  • 54
    • 79959265863 scopus 로고    scopus 로고
    • An evaluation of indirect attacks and countermeasures in fingerprint verification systems
    • M. Martinez-Diaz, J. Fierrez, J. Galbally and J. Ortega-Garcia, An evaluation of indirect attacks and countermeasures in fingerprint verification systems, Pattern Recogn. Lett. 32 (12) (2011) 1643-1651.
    • (2011) Pattern Recogn. Lett. , vol.32 , Issue.12 , pp. 1643-1651
    • Martinez-Diaz, M.1    Fierrez, J.2    Galbally, J.3    Ortega-Garcia, J.4
  • 59
    • 33750332606 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • Springer
    • J. Newsome, B. Karp and D. Song, Paragraph: Thwarting signature learning by training maliciously, in RAID, LNCS (Springer, 2006), pp. 81-105.
    • (2006) RAID, LNCS , pp. 81-105
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 61
    • 84875216992 scopus 로고    scopus 로고
    • Scalable fine-grained behavioral clustering of httpbased malware
    • R. Perdisci, D. Ariu and G. Giacinto, Scalable fine-grained behavioral clustering of httpbased malware, Comput. Netw. 57 (2) (2013) 487-500.
    • (2013) Comput. Netw. , vol.57 , Issue.2 , pp. 487-500
    • Perdisci, R.1    Ariu, D.2    Giacinto, G.3
  • 63
    • 79958743806 scopus 로고    scopus 로고
    • Automatic analysis of malware behavior using machine learning
    • K. Rieck, P. Trinius, C. Willems and T. Holz, Automatic analysis of malware behavior using machine learning, J. Comput. Secur. 19 (4) (2011) 639-668.
    • (2011) J. Comput. Secur. , vol.19 , Issue.4 , pp. 639-668
    • Rieck, K.1    Trinius, P.2    Willems, C.3    Holz, T.4
  • 64
    • 67349227385 scopus 로고    scopus 로고
    • Robustness of multimodal biometric fusion methods against spoof attacks
    • R. N. Rodrigues, L. L. Ling and V. Govindaraju, Robustness of multimodal biometric fusion methods against spoof attacks, J. Vis. Lang. Comput. 20 (3) (2009) 169-179.
    • (2009) J. Vis. Lang. Comput. , vol.20 , Issue.3 , pp. 169-179
    • Rodrigues, R.N.1    Ling, L.L.2    Govindaraju, V.3
  • 67
    • 84877781092 scopus 로고    scopus 로고
    • Learning in a large function space: Privacy-preserving mechanisms for SVM learning
    • B. I. P. Rubinstein, P. L. Bartlett, L. Huang and N. Taft, Learning in a large function space: Privacy-preserving mechanisms for SVM learning, J. Privacy Confidentiality 4 (1) (2012) 65-100.
    • (2012) J. Privacy Confidentiality , vol.4 , Issue.1 , pp. 65-100
    • Rubinstein, B.I.P.1    Bartlett, P.L.2    Huang, L.3    Taft, N.4
  • 68
    • 85162055491 scopus 로고    scopus 로고
    • Convex learning with invariances
    • J. Platt, D. Koller, Y. Singer and S. Roweis, MIT Press, Cambridge, MA
    • C. H. Teo, A. Globerson, S. Roweis and A. Smola, Convex learning with invariances, in Advances in Neural Information Processing Systems 20, eds. J. Platt, D. Koller, Y. Singer and S. Roweis (MIT Press, Cambridge, MA, 2008), pp. 1489-1496.
    • (2008) Advances in Neural Information Processing Systems 20 , pp. 1489-1496
    • Teo, C.H.1    Globerson, A.2    Roweis, S.3    Smola, A.4
  • 70
    • 53849091083 scopus 로고    scopus 로고
    • On attacking statistical spam filters
    • Mountain View, CA, USA
    • G. L. Wittel and S. F. Wu, On attacking statistical spam filters, First Conf. Email and Anti-Spam (Mountain View, CA, USA, 2004), pp. 1-7.
    • (2004) First Conf. Email and Anti-Spam , pp. 1-7
    • Wittel, G.L.1    Wu, S.F.2
  • 72
    • 68949157380 scopus 로고    scopus 로고
    • Robustness and regularization of support vector machines
    • H. Xu, C. Caramanis and S. Mannor, Robustness and regularization of support vector machines, J. Mach. Learn. Res. 10 (2009) 1485-1510.
    • (2009) J. Mach. Learn. Res. , vol.10 , pp. 1485-1510
    • Xu, H.1    Caramanis, C.2    Mannor, S.3
  • 73
    • 84874026375 scopus 로고    scopus 로고
    • Sparse bayesian adversarial learning using relevance vector machine ensembles
    • Y. Zhou, M. Kantarcioglu and B. Thuraisingham, Sparse bayesian adversarial learning using relevance vector machine ensembles, IEEE 12th Int. Conf. Data Mining (2012), pp. 1206-1211.
    • (2012) IEEE 12th Int. Conf. Data Mining , pp. 1206-1211
    • Zhou, Y.1    Kantarcioglu, M.2    Thuraisingham, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.