2,111 research outputs found
Security Evaluation of Support Vector Machines in Adversarial Environments
Support Vector Machines (SVMs) are among the most popular classification
techniques adopted in security applications like malware detection, intrusion
detection, and spam filtering. However, if SVMs are to be incorporated in
real-world security systems, they must be able to cope with attack patterns
that can either mislead the learning algorithm (poisoning), evade detection
(evasion), or gain information about their internal parameters (privacy
breaches). The main contributions of this chapter are twofold. First, we
introduce a formal general framework for the empirical evaluation of the
security of machine-learning systems. Second, according to our framework, we
demonstrate the feasibility of evasion, poisoning and privacy attacks against
SVMs in real-world security problems. For each attack technique, we evaluate
its impact and discuss whether (and how) it can be countered through an
adversary-aware design of SVMs. Our experiments are easily reproducible thanks
to open-source code that we have made available, together with all the employed
datasets, on a public repository.Comment: 47 pages, 9 figures; chapter accepted into book 'Support Vector
Machine Applications
Preliminary results from an investigation of AIS-1 data over an area of epithermal alteration: Plateau, Northern Queensland, Australia
Airborne Imaging Spectrometer-1 (AIS-1) data were flown over undifferentiated sequences of acid to intermediate volcanics and intrusives; meta-sediments; and a series of partially lateritized sedimentary rocks. The area exhibits a considerable spectral variability, after the suppression of striping effects. Log residual, and Internal Average Relative Reflectance (IARR) analytical techniques were used to enhance mineralogically related spectral features. Both methods produce similar results, but did not visually highlight mineral absorption features due to processing artifacts in areas of significant vegetation cover. The enhancement of mineral related absorption features was achieved using a hybrid processing approach based on the relative reflectance differences between vegetated and non-vegetated surfaces at 1.2 and 2.1 micron. The result is an image with little overall contrast, but which enhances the more subtle spectral features believed to be associated with clays and epidote. The AIS data was subject to interactive analysis using SPAM. Clear separation of clay and epidote related absorption features was apparent, and the identification of kaolinite was possible despite detrimental spectral effects
The LHC, shining light on the Dark Side
Starting in the summer of 2007, the Large Hadron Collider (LHC) will collide
proton beams at center-of-mass energies of 14 TeV exceeding by a factor of ten
what was previously achieved. It will be located in the 27km long underground
tunnel, in which the Large Electron Positron collider (LEP) was working until
the year 2000. The Large Hadron Collider is a part of the accelerator complex
of the European Laboratory of Particle Physics (CERN), situated on the
Franco-Swiss border close to Geneva.Comment: 7pages, 5 figure
Contextual Outlier Interpretation
Outlier detection plays an essential role in many data-driven applications to
identify isolated instances that are different from the majority. While many
statistical learning and data mining techniques have been used for developing
more effective outlier detection algorithms, the interpretation of detected
outliers does not receive much attention. Interpretation is becoming
increasingly important to help people trust and evaluate the developed models
through providing intrinsic reasons why the certain outliers are chosen. It is
difficult, if not impossible, to simply apply feature selection for explaining
outliers due to the distinct characteristics of various detection models,
complicated structures of data in certain applications, and imbalanced
distribution of outliers and normal instances. In addition, the role of
contrastive contexts where outliers locate, as well as the relation between
outliers and contexts, are usually overlooked in interpretation. To tackle the
issues above, in this paper, we propose a novel Contextual Outlier
INterpretation (COIN) method to explain the abnormality of existing outliers
spotted by detectors. The interpretability for an outlier is achieved from
three aspects: outlierness score, attributes that contribute to the
abnormality, and contextual description of its neighborhoods. Experimental
results on various types of datasets demonstrate the flexibility and
effectiveness of the proposed framework compared with existing interpretation
approaches
- …