메뉴 건너뛰기




Volumn 26, Issue 4, 2014, Pages 984-996

Security evaluation of pattern classifiers under attack

Author keywords

Adversarial classification; Pattern classification; Performance evaluation; Robustness evaluation; Security evaluation

Indexed keywords

BIOMETRICS; INTRUSION DETECTION; PATTERN RECOGNITION; PATTERN RECOGNITION SYSTEMS;

EID: 84992268362     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2013.57     Document Type: Article
Times cited : (431)

References (54)
  • 1
    • 67349227385 scopus 로고    scopus 로고
    • Robustness of multimodal biometric fusion methods against spoof attacks
    • R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of Multimodal Biometric Fusion Methods against Spoof Attacks," J. Visual Languages and Computing, vol. 20, no. 3, pp. 169-179, 2009.
    • (2009) J. Visual Languages and Computing , vol.20 , Issue.3 , pp. 169-179
    • Rodrigues, R.N.1    Ling, L.L.2    Govindaraju, V.3
  • 7
    • 77954868784 scopus 로고    scopus 로고
    • Adversarial knowledge discovery
    • Nov. /Dec.
    • D. B. Skillicorn, "Adversarial Knowledge Discovery," IEEE Intelligent Systems, vol. 24, no. 6, Nov. /Dec. 2009.
    • (2009) IEEE Intelligent Systems , vol.24 , Issue.6
    • Skillicorn, D.B.1
  • 8
    • 57349128585 scopus 로고    scopus 로고
    • Adversarial information retrieval: the manipulation of web content
    • D. Fetterly, "Adversarial Information Retrieval: The Manipulation of Web Content," ACM Computing Rev., 2007.
    • (2007) ACM Computing Rev.
    • Fetterly, D.1
  • 13
    • 78049528115 scopus 로고    scopus 로고
    • Machine learning in adversarial environments
    • P. Laskov and R. Lippmann, "Machine Learning in Adversarial Environments," Machine Learning, vol. 81, pp. 115-119, 2010.
    • (2010) Machine Learning , vol.81 , pp. 115-119
    • Laskov, P.1    Lippmann, R.2
  • 24
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
    • DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
    • R. Perdisci, G. Gu, and W. Lee, "Using an Ensemble of One-Class SVM Classifiers to Harden Payload-Based Anomaly Detection Systems," Proc. Int'l Conf. Data Mining, pp. 488-498, 2006. (Pubitemid 47485828)
    • (2007) Proceedings - IEEE International Conference on Data Mining, ICDM , pp. 488-498
    • Perdisci, R.1    Gu, O.2    Lee, W.3
  • 26
    • 46249103547 scopus 로고    scopus 로고
    • A multiple instance learning strategy for combating good word attacks on spam filters
    • Z. Jorgensen, Y. Zhou, and M. Inge, "A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters," J. Machine Learning Research, vol. 9, pp. 1115-1146, 2008.
    • (2008) J. Machine Learning Research , vol.9 , pp. 1115-1146
    • Jorgensen, Z.1    Zhou, Y.2    Inge, M.3
  • 31
    • 78049529865 scopus 로고    scopus 로고
    • Learning to classify with missing and corrupted features
    • O. Dekel, O. Shamir, and L. Xiao, "Learning to Classify with Missing and Corrupted Features," Machine Learning, vol. 81, pp. 149-178, 2010.
    • (2010) Machine Learning , vol.81 , pp. 149-178
    • Dekel, O.1    Shamir, O.2    Xiao, L.3
  • 33
    • 79952315022 scopus 로고    scopus 로고
    • Multiple classifier systems for robust classifier design in adversarial environments
    • B. Biggio, G. Fumera, and F. Roli, "Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments," Int'l J. Machine Learning and Cybernetics, vol. 1, no. 1, pp. 27-41, 2010.
    • (2010) Int'l J. Machine Learning and Cybernetics , vol.1 , Issue.1 , pp. 27-41
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 37
    • 0027640858 scopus 로고
    • Learning in the presence of malicious errors
    • M. Kearns and M. Li, "Learning in the Presence of Malicious Errors," SIAM J. Computing, vol. 22, no. 4, pp. 807-837, 1993. (Pubitemid 23677152)
    • (1993) SIAM Journal on Computing , vol.22 , Issue.4 , pp. 807-837
    • Kearns Michael1    Li Ming2
  • 38
    • 33751035185 scopus 로고    scopus 로고
    • A framework for the evaluation of intrusion detection systems
    • DOI 10.1109/SP.2006.2, 1624001, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • A. A. C-ardenas, J. S. Baras, and K. Seamon, "A Framework for the Evaluation of Intrusion Detection Systems," Proc. IEEE Symp. Security and Privacy, pp. 63-77, 2006. (Pubitemid 44753712)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 63-77
    • Cardenas, A.A.1    Baras, J.S.2    Seamon, K.3
  • 40
    • 84869200775 scopus 로고    scopus 로고
    • Static prediction games for adversarial learning problems
    • M. Br?uckner, C. Kanzow, and T. Scheffer, "Static Prediction Games for Adversarial Learning Problems," J. Machine Learning Research, vol. 13, pp. 2617-2654, 2012.
    • (2012) J. Machine Learning Research , vol.13 , pp. 2617-2654
    • Bruckner, M.1    Kanzow, C.2    Scheffer, T.3
  • 41
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
    • A. Adler, "Vulnerabilities in Biometric Encryption Systems," Proc. Fifth Int'l Conf. Audio-and Video-Based Biometric Person Authentication, pp. 1100-1109, 2005. (Pubitemid 41423129)
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 1100-1109
    • Adler, A.1
  • 43
    • 0032594950 scopus 로고    scopus 로고
    • Support vector machines for spam categorization
    • Sept.
    • H. Drucker, D. Wu, and V. N. Vapnik, "Support Vector Machines for Spam Categorization," IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1048-1054, Sept. 1999.
    • (1999) IEEE Trans. Neural Networks , vol.10 , Issue.5 , pp. 1048-1054
    • Drucker, H.1    Wu, D.2    Vapnik, V.N.3
  • 44
    • 0002442796 scopus 로고    scopus 로고
    • Machine learning in automated text categorization
    • F. Sebastiani, "Machine Learning in Automated Text Categorization," ACM Computing Surveys, vol. 34, pp. 1-47, 2002.
    • (2002) ACM Computing Surveys , vol.34 , pp. 1-47
    • Sebastiani, F.1
  • 48
    • 84866671111 scopus 로고    scopus 로고
    • Security evaluation of biometric authentication systems under real spoofing attacks
    • B. Biggio, Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, "Security Evaluation of Biometric Authentication Systems under Real Spoofing Attacks," IET Biometrics, vol. 1, no. 1, pp. 11-24, 2012.
    • (2012) IET Biometrics , vol.1 , Issue.1 , pp. 11-24
    • Biggio, B.1    Akhtar, Z.2    Fumera, G.3    Marcialis, G.L.4    Roli, F.5
  • 52
    • 84856463585 scopus 로고    scopus 로고
    • Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers
    • D. Sculley, G. Wachman, and C. E. Brodley, "Spam Filtering Using Inexact String Matching in Explicit Feature Space with on-Line Linear Classifiers," Proc. 15th Text Retrieval Conf., 2006.
    • (2006) Proc. 15th Text Retrieval Conf.
    • Sculley, D.1    Wachman, G.2    Brodley, C.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.