2021
DOI: 10.1016/j.cose.2021.102268
|View full text |Cite
|
Sign up to set email alerts
|

Decision tree pairwise metric learning against adversarial attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Other minor differences exist between these four main DT algorithms such as, how to deal with missing value, variable selection, capacity to handle a huge number of classes in variables, and pruning methods [28][29][30]. DT has been used in phishing detection [31] and Adversarial detection [32]. 3.…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
“…Other minor differences exist between these four main DT algorithms such as, how to deal with missing value, variable selection, capacity to handle a huge number of classes in variables, and pruning methods [28][29][30]. DT has been used in phishing detection [31] and Adversarial detection [32]. 3.…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
“…Studies related to data analysis in time series have been carried out for a long time [38,39]. ML-based applications have become more popular due to their high performance on data inference, outperforming even classical statistical models [40].…”
Section: Generation Forecasting Modulementioning
confidence: 99%
“…Adversarial attacks have been investigated in the area of image, audios, texts and recently in Windows executable files classification exercise and a number of successful attacks examples in image, audios and texts have been generated to cause misclassification [1][2][3][4][5][6][7]. The principal reason for the success in image, audios and texts is that their feature-space is comparatively fixed, an image or text can be formatted as a three-dimensional array of pixels with each pixel value as a three-dimensional RGB (red, green, blue) vector value ranged from 0 to 255, thus, is feasible to find an exact function that is differentiable, therefore, a feature-space attack built on gradients can instantly apply on text or images to create adversarial attack examples.…”
Section: Introductionmentioning
confidence: 99%