Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop 2014
DOI: 10.1145/2666652.2666656
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Active Learning

Abstract: Active learning is an area of machine learning examining strategies for allocation of finite resources, particularly human labeling efforts and to an extent feature extraction, in situations where available data exceeds available resources. In this open problem paper, we motivate the necessity of active learning in the security domain, identify problems caused by the application of present active learning techniques in adversarial settings, and propose a framework for experimentation and implementation of acti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(56 citation statements)
references
References 43 publications
(38 reference statements)
0
54
0
Order By: Relevance
“…Online active learning [21,30,31,44,45] is well-suited to follow the evolution of the threats: experts perform annotations over time to update the detection model that is already deployed. In this setting, the detection model in production has been initially trained on a labelled dataset representative of the deployment environment.…”
Section: Fig 2: Sampling Bias Examplementioning
confidence: 99%
“…Online active learning [21,30,31,44,45] is well-suited to follow the evolution of the threats: experts perform annotations over time to update the detection model that is already deployed. In this setting, the detection model in production has been initially trained on a labelled dataset representative of the deployment environment.…”
Section: Fig 2: Sampling Bias Examplementioning
confidence: 99%
“…This is represented by the evaluator, which is an external component that can be inserted into the analysis phase. The evaluator functionality can be performed by a human examiner as well as an external plugin which implements advanced AI techniques [10], such as Machine Learning [11], Expert Systems [12], Human Expertise, and so on.…”
Section: Design and Architecturementioning
confidence: 99%
“…The other dimension is about designing and developing a software environment where one can explore and exploit in a coordinated fashion different functional modules that complement each other and address conflicting asymmetries. The proposed integrated environment should expand on the likes of SALT [2] and optimally engage and gate modules that challenge both offense and defense while at the same time enhances and evaluates both. Such an enterprise is supported by meta-reasoning and meta-recognition, whose workings are intertwined.…”
Section: Meta-reasoning and Meta-recognitionmentioning
confidence: 99%
“…Miller et al [2] have recently surveyed the field of ACL to promote Security-oriented Active Learning Testbed (SALT) architecture in order to experiment and evaluate diverse strategies surrounding active learning to counter adversarial contexts and deliberate manipulation. SALT evaluation has been so far relatively limited to the continuous 2D feature space where the aim is usually that of learning a binary classifier while evaluating different active learning strategies to prioritize requests (e.g., queries) for annotation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation