2014
DOI: 10.1117/12.2053045
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…A generic approach, such as genetic algorithms that repeatedly retrain the algorithm to find the point that has the most optimal effect on the test score of the target point, requires less prior knowledge of the algorithms and can therefore be applied to a large variety of ML algorithms [7] [11]. However, the repeated retrains often take a large amount of time, which is infeasible with insufficient resources.…”
Section: Introductionmentioning
confidence: 99%
“…A generic approach, such as genetic algorithms that repeatedly retrain the algorithm to find the point that has the most optimal effect on the test score of the target point, requires less prior knowledge of the algorithms and can therefore be applied to a large variety of ML algorithms [7] [11]. However, the repeated retrains often take a large amount of time, which is infeasible with insufficient resources.…”
Section: Introductionmentioning
confidence: 99%