2,111 research outputs found

    Security Evaluation of Support Vector Machines in Adversarial Environments

    Full text link
    Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain information about their internal parameters (privacy breaches). The main contributions of this chapter are twofold. First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems. Second, according to our framework, we demonstrate the feasibility of evasion, poisoning and privacy attacks against SVMs in real-world security problems. For each attack technique, we evaluate its impact and discuss whether (and how) it can be countered through an adversary-aware design of SVMs. Our experiments are easily reproducible thanks to open-source code that we have made available, together with all the employed datasets, on a public repository.Comment: 47 pages, 9 figures; chapter accepted into book 'Support Vector Machine Applications

    Preliminary results from an investigation of AIS-1 data over an area of epithermal alteration: Plateau, Northern Queensland, Australia

    Get PDF
    Airborne Imaging Spectrometer-1 (AIS-1) data were flown over undifferentiated sequences of acid to intermediate volcanics and intrusives; meta-sediments; and a series of partially lateritized sedimentary rocks. The area exhibits a considerable spectral variability, after the suppression of striping effects. Log residual, and Internal Average Relative Reflectance (IARR) analytical techniques were used to enhance mineralogically related spectral features. Both methods produce similar results, but did not visually highlight mineral absorption features due to processing artifacts in areas of significant vegetation cover. The enhancement of mineral related absorption features was achieved using a hybrid processing approach based on the relative reflectance differences between vegetated and non-vegetated surfaces at 1.2 and 2.1 micron. The result is an image with little overall contrast, but which enhances the more subtle spectral features believed to be associated with clays and epidote. The AIS data was subject to interactive analysis using SPAM. Clear separation of clay and epidote related absorption features was apparent, and the identification of kaolinite was possible despite detrimental spectral effects

    The LHC, shining light on the Dark Side

    Full text link
    Starting in the summer of 2007, the Large Hadron Collider (LHC) will collide proton beams at center-of-mass energies of 14 TeV exceeding by a factor of ten what was previously achieved. It will be located in the 27km long underground tunnel, in which the Large Electron Positron collider (LEP) was working until the year 2000. The Large Hadron Collider is a part of the accelerator complex of the European Laboratory of Particle Physics (CERN), situated on the Franco-Swiss border close to Geneva.Comment: 7pages, 5 figure

    Contextual Outlier Interpretation

    Full text link
    Outlier detection plays an essential role in many data-driven applications to identify isolated instances that are different from the majority. While many statistical learning and data mining techniques have been used for developing more effective outlier detection algorithms, the interpretation of detected outliers does not receive much attention. Interpretation is becoming increasingly important to help people trust and evaluate the developed models through providing intrinsic reasons why the certain outliers are chosen. It is difficult, if not impossible, to simply apply feature selection for explaining outliers due to the distinct characteristics of various detection models, complicated structures of data in certain applications, and imbalanced distribution of outliers and normal instances. In addition, the role of contrastive contexts where outliers locate, as well as the relation between outliers and contexts, are usually overlooked in interpretation. To tackle the issues above, in this paper, we propose a novel Contextual Outlier INterpretation (COIN) method to explain the abnormality of existing outliers spotted by detectors. The interpretability for an outlier is achieved from three aspects: outlierness score, attributes that contribute to the abnormality, and contextual description of its neighborhoods. Experimental results on various types of datasets demonstrate the flexibility and effectiveness of the proposed framework compared with existing interpretation approaches
    corecore