SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Multiple Classifier Systems for Adversarial Classification Tasks Battista Biggio, Giorgio Fumera and Fabio Roli  Dept. of Electrical and Electronic Eng., University of Cagliari
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traditional pattern recognition problems Physical / logical process Feature measurement Classification
Adversarial classification problems Physical / logical process: legitimate samples Classification Feature measurement Adversary: malicious samples
Adversarial classification: previous works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design of pattern recognition systems Goal in “traditional” applications: maximise  accuracy Data acquisition Feature extraction Model selection Classification
Design of pattern recognition systems Goal in “traditional” applications: maximise  accuracy Data acquisition Feature extraction Model selection Classification Goal in adversarial classification tasks: maximise  accuracy  and  hardness of evasion Data acquisition Feature extraction Model selection Classification
Design of pattern recognition systems Goal in “traditional” applications: maximise  accuracy Data acquisition Feature extraction Model selection Classification Goal in adversarial classification tasks: maximise  accuracy  and  hardness of evasion Data acquisition Feature extraction Model selection Classification
Hardness of evasion + th x 1 ... x n ≥  0: malicious < 0: legitimate Decision function ... y    {malicious, legitimate}
Hardness of evasion + th x 1 ... x n ≥  0: malicious < 0: legitimate Decision function ... y    {malicious, legitimate} Expected value of the minimum number of features the adversary has to modify to evade the classifier ( worst  case: the adversary has full knowledge on the classifier)‏
Hardness of evasion: an example + th = 2 x 1  = 1 x 2  = 1 x 3  = 0 x 4  = 1 x 5  = 0 ≥  0: malicious < 0: legitimate x = (1 1 0 1 0)  0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
Hardness of evasion: an example + th = 2 x 1  = 1 x 2  = 1 x 3  = 0 x 4  = 1 x 5  = 0 ≥  0: malicious < 0: legitimate x = (1 1 0 1 0)  0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
Hardness of evasion: an example + th = 2 x 1  = 0 x 2  = 1 x 3  = 1 x 4  = 0 x 5  = 0 ≥  0: malicious < 0: legitimate x = (0 1 1 0 0)  0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
Hardness of evasion: an example + th = 2 x 1  = 0 x 2  = 1 x 3  = 1 x 4  = 0 x 5  = 0 ≥  0: malicious < 0: legitimate x = (0 1 1 0 0)  0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
Comparison of two classifier architectures x 1 x n x 2 t w 1 w 2 ... w n X x i     {0,1}
Comparison of two classifier architectures x 1 x n x 2 t t 1 w 1 w 2 ... w n ... t 2 ... ... t N ... X 1 X 2 X N OR X 1     X 2     ...    X N  = X X i     X j  =   , i    j X x i     {0,1}
Comparison of two classifier architectures x 1 x n x 2 t t 1 w 1 w 2 ... w n ... t 2 ... ... t N ... X 1 X 2 X N OR X 1     X 2     ...    X N  = X X i     X j  =   , i    j x 1 , x 2 ,..., x n  i.i.d. identical weights t 1  = t 2  =...= t n , |X i | = n/N X x i     {0,1}
Comparison of two classifier architectures p 1A = 0.25  p 1L = 0.15 Details are in the paper
Comparison of two classifier architectures p 1A = 0.25  p 1L = 0.15 Details are in the paper
Comparison of two classifier architectures ROC working point: min (C  FP + FN)‏ C = 1, 2, 10, 100 C = 1 C = 2 C = 10 C = 100
Experimental set-up ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experimental results
Conclusions ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Lec 8 03_sept [compatibility mode]
Lec 8 03_sept [compatibility mode]Lec 8 03_sept [compatibility mode]
Lec 8 03_sept [compatibility mode]
Palak Sanghani
 
Introduction
IntroductionIntroduction
Introduction
butest
 
Chapter 6.6
Chapter 6.6Chapter 6.6
Chapter 6.6
sotlsoc
 

La actualidad más candente (12)

"Java Concurrency Stress tests Tool" at IT Tage 2017 by Vadym Kazulkin/Rodion...
"Java Concurrency Stress tests Tool" at IT Tage 2017 by Vadym Kazulkin/Rodion..."Java Concurrency Stress tests Tool" at IT Tage 2017 by Vadym Kazulkin/Rodion...
"Java Concurrency Stress tests Tool" at IT Tage 2017 by Vadym Kazulkin/Rodion...
 
Lec 8 03_sept [compatibility mode]
Lec 8 03_sept [compatibility mode]Lec 8 03_sept [compatibility mode]
Lec 8 03_sept [compatibility mode]
 
Introduction
IntroductionIntroduction
Introduction
 
Second chapter-java
Second chapter-javaSecond chapter-java
Second chapter-java
 
Section6 stochastic
Section6 stochasticSection6 stochastic
Section6 stochastic
 
Machine learning
Machine learningMachine learning
Machine learning
 
قائمة القارات
قائمة القاراتقائمة القارات
قائمة القارات
 
Efnsjdnfsuies
EfnsjdnfsuiesEfnsjdnfsuies
Efnsjdnfsuies
 
Classification using Apache SystemML by Prithviraj Sen
Classification using Apache SystemML by Prithviraj SenClassification using Apache SystemML by Prithviraj Sen
Classification using Apache SystemML by Prithviraj Sen
 
Chapter 6.6
Chapter 6.6Chapter 6.6
Chapter 6.6
 
Studyx4
Studyx4Studyx4
Studyx4
 
Computational models
Computational models Computational models
Computational models
 

Similar a Multiple Classifier Systems for Adversarial Classification Tasks

isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
butest
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Pluribus One
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzer
butest
 
CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...
CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...
CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...
zukun
 

Similar a Multiple Classifier Systems for Adversarial Classification Tasks (20)

isabelle_webinar_jan..
isabelle_webinar_jan..isabelle_webinar_jan..
isabelle_webinar_jan..
 
机器学习Adaboost
机器学习Adaboost机器学习Adaboost
机器学习Adaboost
 
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
CONSTRUCTING A FUZZY NETWORK INTRUSION CLASSIFIER BASED ON DIFFERENTIAL EVOLU...
 
MLHEP 2015: Introductory Lecture #1
MLHEP 2015: Introductory Lecture #1MLHEP 2015: Introductory Lecture #1
MLHEP 2015: Introductory Lecture #1
 
Machine learning in science and industry — day 1
Machine learning in science and industry — day 1Machine learning in science and industry — day 1
Machine learning in science and industry — day 1
 
Support vector machine
Support vector machineSupport vector machine
Support vector machine
 
Complex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutionsComplex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutions
 
Optimization Techniques.pdf
Optimization Techniques.pdfOptimization Techniques.pdf
Optimization Techniques.pdf
 
Svm dbeth
Svm dbethSvm dbeth
Svm dbeth
 
Gradient Boosted Regression Trees in scikit-learn
Gradient Boosted Regression Trees in scikit-learnGradient Boosted Regression Trees in scikit-learn
Gradient Boosted Regression Trees in scikit-learn
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzer
 
Bayes ML.ppt
Bayes ML.pptBayes ML.ppt
Bayes ML.ppt
 
CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...
CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...
CVPR2009 tutorial: Kernel Methods in Computer Vision: part I: Introduction to...
 
presentazione
presentazionepresentazione
presentazione
 
ML MODULE 2.pdf
ML MODULE 2.pdfML MODULE 2.pdf
ML MODULE 2.pdf
 
Joint optimization framework for learning with noisy labels
Joint optimization framework for learning with noisy labelsJoint optimization framework for learning with noisy labels
Joint optimization framework for learning with noisy labels
 
Machine learning for_finance
Machine learning for_financeMachine learning for_finance
Machine learning for_finance
 
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
Gradient Boosted Regression Trees in Scikit Learn by Gilles Louppe & Peter Pr...
 
Visualizing the Model Selection Process
Visualizing the Model Selection ProcessVisualizing the Model Selection Process
Visualizing the Model Selection Process
 

Más de Pluribus One

Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Pluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
Pluribus One
 

Más de Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Multiple Classifier Systems for Adversarial Classification Tasks

  • 1. Multiple Classifier Systems for Adversarial Classification Tasks Battista Biggio, Giorgio Fumera and Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari
  • 2.
  • 3. Traditional pattern recognition problems Physical / logical process Feature measurement Classification
  • 4. Adversarial classification problems Physical / logical process: legitimate samples Classification Feature measurement Adversary: malicious samples
  • 5.
  • 6. Design of pattern recognition systems Goal in “traditional” applications: maximise accuracy Data acquisition Feature extraction Model selection Classification
  • 7. Design of pattern recognition systems Goal in “traditional” applications: maximise accuracy Data acquisition Feature extraction Model selection Classification Goal in adversarial classification tasks: maximise accuracy and hardness of evasion Data acquisition Feature extraction Model selection Classification
  • 8. Design of pattern recognition systems Goal in “traditional” applications: maximise accuracy Data acquisition Feature extraction Model selection Classification Goal in adversarial classification tasks: maximise accuracy and hardness of evasion Data acquisition Feature extraction Model selection Classification
  • 9. Hardness of evasion + th x 1 ... x n ≥ 0: malicious < 0: legitimate Decision function ... y  {malicious, legitimate}
  • 10. Hardness of evasion + th x 1 ... x n ≥ 0: malicious < 0: legitimate Decision function ... y  {malicious, legitimate} Expected value of the minimum number of features the adversary has to modify to evade the classifier ( worst case: the adversary has full knowledge on the classifier)‏
  • 11. Hardness of evasion: an example + th = 2 x 1 = 1 x 2 = 1 x 3 = 0 x 4 = 1 x 5 = 0 ≥ 0: malicious < 0: legitimate x = (1 1 0 1 0) 0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
  • 12. Hardness of evasion: an example + th = 2 x 1 = 1 x 2 = 1 x 3 = 0 x 4 = 1 x 5 = 0 ≥ 0: malicious < 0: legitimate x = (1 1 0 1 0) 0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
  • 13. Hardness of evasion: an example + th = 2 x 1 = 0 x 2 = 1 x 3 = 1 x 4 = 0 x 5 = 0 ≥ 0: malicious < 0: legitimate x = (0 1 1 0 0) 0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
  • 14. Hardness of evasion: an example + th = 2 x 1 = 0 x 2 = 1 x 3 = 1 x 4 = 0 x 5 = 0 ≥ 0: malicious < 0: legitimate x = (0 1 1 0 0) 0.3 0.8 3.0 1.5 1.0 Expected value of the minimum number of features the adversary has to modify to evade the classifier
  • 15. Comparison of two classifier architectures x 1 x n x 2 t w 1 w 2 ... w n X x i  {0,1}
  • 16. Comparison of two classifier architectures x 1 x n x 2 t t 1 w 1 w 2 ... w n ... t 2 ... ... t N ... X 1 X 2 X N OR X 1  X 2  ...  X N = X X i  X j =  , i  j X x i  {0,1}
  • 17. Comparison of two classifier architectures x 1 x n x 2 t t 1 w 1 w 2 ... w n ... t 2 ... ... t N ... X 1 X 2 X N OR X 1  X 2  ...  X N = X X i  X j =  , i  j x 1 , x 2 ,..., x n i.i.d. identical weights t 1 = t 2 =...= t n , |X i | = n/N X x i  {0,1}
  • 18. Comparison of two classifier architectures p 1A = 0.25 p 1L = 0.15 Details are in the paper
  • 19. Comparison of two classifier architectures p 1A = 0.25 p 1L = 0.15 Details are in the paper
  • 20. Comparison of two classifier architectures ROC working point: min (C  FP + FN)‏ C = 1, 2, 10, 100 C = 1 C = 2 C = 10 C = 100
  • 21.
  • 23.