The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models

1Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the training data of machine learning models, thereby manipulating their behavior. This process is not only technically intricate but also frequently dependent on the characteristics of the victim (target) model. To protect the victim model, the vast number of DPAs and their variants make defenders rely on trial and error techniques to find the ultimate defence solution which is exhausting and very time-consuming. This paper comprehensively summarises the latest research on DPAs and defences, proposes a DPA characterizing model to help investigate adversary attacks dependency on the victim model, and builds a DPA roadmap as the path navigating to defence. Having the roadmap as an applied framework that contains DPA families sharing the same features and mathematical computations will equip the defenders with a powerful tool to quickly find the ultimate defences, away from the exhausting trial and error methodology. The roadmap validated by use cases has been made available as an open access platform, enabling other researchers to add in new DPAs and update the map continuously.

Cite

CITATION STYLE

APA

Chaalan, T., Pang, S., Kamruzzaman, J., Gondal, I., & Zhang, X. (2024). The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. ACM Computing Surveys, 56(7). https://doi.org/10.1145/3627536

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free