Chrome Extension
WeChat Mini Program
Use on ChatGLM

The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models.

ACM Comput. Surv.(2024)

Cited 0|Views8
No score
Abstract
The approach and process of Data Poisoning Attacks (DPA) to distort training data to machine learning model and manipulate the model behaviours is not only technically complex but also often victim model dependent. To protect the victim model, the vast number of DPAs and their variants make defenders rely on trial and error techniques to find the ultimate defence solution which is exhausting and very time-consuming. This paper comprehensively summarises the latest research on DPAs and defences, proposes a DPA characterizing model to help investigate adversary attacks dependency on the victim model, and builds a DPA roadmap as the path navigating to defence. Having the roadmap as an applied framework that contains DPA families sharing the same features and mathematical computations will equip the defenders with a powerful tool to quickly find the ultimate defences, away from the exhausting trial and error methodology. The roadmap validated by use cases has been made available as an open access platform, enabling other researchers to add in new DPAs and update the map continuously.
More
Translated text
Key words
data poisoning attacks,victim models
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined