399
Views
7
CrossRef citations to date
0
Altmetric
Articles

Adversarial data poisoning attacks against the PC learning algorithm

, , &
Pages 3-31 | Received 11 Dec 2018, Accepted 08 Mar 2019, Published online: 17 Jun 2019

References

  • Alfeld, Scott, Xiaojin Zhu, and Paul Barford. 2016. “Data Poisoning Attacks against Autoregressive Models.” In AAAI, 1452–1458.
  • Ali, Ayesha R., Thomas S. Richardson, Peter Spirtes, and Jiji Zhang. 2012. “Towards Characterizing Markov Equivalence Classes for Directed Acyclic Graphs with Latent Variables.” CoRR abs/1207.1365.
  • Alsuwat, Emad, Hatim Alsuwat, Marco Valtorta, and Csilla Farkas. 2018. “Cyber Attacks against the PC Learning Algorithm.” In 2nd International Workshop on A.I. in Security, 19–35.
  • Alsuwat, Emad, Marco Valtorta, and Csilla Farkas. 2018a. Bayesian Structure Learning Attacks. Technical Report. University of South Carolina.
  • Alsuwat, Emad, Marco Valtorta, and Csilla Farkas. 2018b. “How to Generate the Network You Want with the PC Learning Algorithm.” Proceedings of WUPES 18: 1–12.
  • Barreno, Marco, Blaine Nelson, Anthony D. Joseph, and J. D. Tygar. 2010. “The Security of Machine Learning.” Machine Learning 81 (2): 121–148. doi: 10.1007/s10994-010-5188-5
  • Barreno, Marco, Blaine Nelson, Russell Sears, Anthony D. Joseph, and J. Doug Tygar. 2006. “Can Machine Learning be Secure?” In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 16–25. ACM.
  • Biggio, Battista, Igino Corona, Davide Maiorca, and Blaine Nelson. 2013. “Evasion Attacks against Machine Learning at Test Time.” In Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 387–402. Springer.
  • Biggio, Battista, Blaine Nelson, and Pavel Laskov. 2012. “Poisoning Attacks against Support Vector Machines.” In Proceedings of the 29th International Coference on International Conference on Machine Learning, 1467–1474. Omnipress.
  • Boerlage, Brent. 1992. “Link Strength in Bayesian Networks.” PhD diss., University of British Columbia.
  • Burkard, Cody, and Brent Lagesse. 2017. “Analysis of Causative Attacks against SVMs Learning from Data Streams.” In Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 31–36. ACM.
  • Ebert-Uphoff, Imme. 2009. Tutorial on How to Measure Link Strengths in Discrete Bayesian Networks. Technical Report. Georgia Institute of Technology.
  • Goodfellow, Ian, Jonathon Shlens, and Christian Szegedy. 2015. “Explaining and Harnessing Adversarial Examples.” In International Conference on Learning Representations.
  • Huang, Ling, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, and J. D. Tygar. 2011. “Adversarial Machine Learning.” In Proceedings of the 4th ACM workshop on Security and Artificial Intelligence, 43–58. ACM.
  • Hugin Expert, A. n.d.. “S, 2008.” Hugin Researcher API 7.0 (www. hugin. com) .
  • Jensen, F. V., and T. D. Nielsen. 2007. Bayesian Networks and Decision Graphs. 2nd ed. New York, NY: Springer.
  • Kantchelian, Alex, J. D. Tygar, and Anthony Joseph. 2016. “Evasion and Hardening of Tree Ensemble Classifiers.” In International Conference on Machine Learning, 2387–2396.
  • Koh, Pang Wei, and Percy Liang. 2017. “Understanding Black-Box Predictions via Influence Functions.” In International Conference on Machine Learning, 1885–1894.
  • Lauritzen, Steffen L., and David J. Spiegelhalter. 1988. “Local Computations with Probabilities on Graphical Structures and their Application to Expert Systems.” Journal of the Royal Statistical Society. Series B (Methodological)50: 157–194. doi: 10.1111/j.2517-6161.1988.tb01721.x
  • Lynch, Scott M. 2007. Introduction to Applied Bayesian Statistics and Estimation for Social Scientists. New York: Springer.
  • Madsen, Anders L., Frank Jensen, Uffe B. Kjaerulff, and Michael Lang. 2005. “The Hugin Tool for Probabilistic Graphical Models.” International Journal on Artificial Intelligence Tools 14 (3): 507–543. doi: 10.1142/S0218213005002235
  • McHugh, Mary L. 2013. “The Chi-square Test of Independence.” Biochemia Medica: BiochemiaMedica 23 (2): 143–149. doi: 10.11613/BM.2013.018
  • Mei, Shike, and Xiaojin Zhu. 2015a. “The Security of Latent Dirichlet Allocation.” In Artificial Intelligence and Statistics, 681–689.
  • Mei, Shike, and Xiaojin Zhu. 2015b. “Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners.” In AAAI, 2871–2877.
  • Muñoz-González, Luis, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, and Fabio Roli. 2017. “Towards Poisoning of Deep Learning Algorithms with Back-Gradient Optimization.” In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 27–38. ACM.
  • Neapolitan, Richard E. 2004. Learning Bayesian Networks. Upper Saddle River, NJ: Pearson Prentice Hall. Vol. 38.
  • Newell, Andrew, Rahul Potharaju, Luojie Xiang, and Cristina Nita-Rotaru. 2014. “On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 83–93. ACM.
  • Olesen, Kristian G., Steffen L. Lauritzen, and Finn V. Jensen. 1992. “aHUGIN: A System Creating Adaptive Causal Probabilistic Networks.” In Uncertainty in Artificial Intelligence, 1992, 223–229. Elsevier.
  • Pearl, Judea. 2009. Causality. New York: Cambridge University Press.
  • Raiffa, Howard, and Robert Schlaifer. 1961. Applied Statistical Decision Theory. Cambridge, MA: Harvard University Press.
  • Scutari, M. 2010. “Learning Bayesian Networks with the Bnlearn R Package.” Journal of Statistical Software 35 (3): 1–22. doi: 10.18637/jss.v035.i03
  • Spirtes, Peter, and Clark Glymour. 1991. “An Algorithm for Fast Recovery of Sparse Causal Graphs.” Social Science Computer Review 9 (1): 62–72. doi: 10.1177/089443939100900106
  • Spirtes, Peter, Clark N. Glymour, and Richard Scheines. 2000. Causation, Prediction, and Search. New York: MIT press.
  • Šrndić, Nedim, and Pavel Laskov. 2014. “Practical Evasion of a Learning-Based Classifier: A Case Study.” In 2014 IEEE Symposium on Security and Privacy (SP), 197–211. IEEE.
  • Szegedy, Christian, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. “Intriguing Properties of Neural Networks.” In International Conference on Learning Representations.
  • Xiao, Huang, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, and Fabio Roli. 2015. “Support Vector Machines under Adversarial Label Contamination.” Neurocomputing 160: 53–62. doi: 10.1016/j.neucom.2014.08.081
  • Xiao, Han, Huang Xiao, and Claudia Eckert. 2012. “Adversarial Label Flips Attack on Support Vector Machines.” In ECAI, 870–875.
  • Yang, Chaofei, Qing Wu, Hai Li, and Yiran Chen. 2017. “Generative Poisoning Attack Method Against Neural Networks.” CoRR abs/1703.01340.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.