2022
DOI: 10.1016/j.jisa.2022.103121
|View full text |Cite
|
Sign up to set email alerts
|

Towards a robust and trustworthy machine learning system development: An engineering perspective

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 55 publications
0
9
0
Order By: Relevance
“…These models consider dynamic factors, model map information, and can incorporate interactionrelated factors, allowing adaptation to complex scenes [1]. However, many deep learning models are known to be sensitive to small errors and susceptible to external attacks, potentially resulting in undesirable behavior and decreased performance [13]. Therefore, ensuring reliable performance (often called robustness) is key to the safe deployment of these deep learning models.…”
Section: Introductionmentioning
confidence: 99%
“…These models consider dynamic factors, model map information, and can incorporate interactionrelated factors, allowing adaptation to complex scenes [1]. However, many deep learning models are known to be sensitive to small errors and susceptible to external attacks, potentially resulting in undesirable behavior and decreased performance [13]. Therefore, ensuring reliable performance (often called robustness) is key to the safe deployment of these deep learning models.…”
Section: Introductionmentioning
confidence: 99%
“…Social engineering attacks can involve the creation of fake RTU-CAV messages, phishing, or GPS map poisoning. Social engineering attacks [152] Data sanitization techniques [153], [154], [155], Adversarial sample thwarting (e.g., data transformation, noise filtering, mapping to normal samples) [156], Generalization enhancement (e.g., bagging, random subspace method, antidote, etc.) [151], Training data filtering (e.g., input manipulation detection, gradient shaping) [46], Robust learning (e.g., model robustifying and verification) [46], Feature obfuscation [157], Active learning systems [157], Min-max optimization [158], [159] Gradient-based approach [160], Enhance generalization capability using adversarial feature selection method [161].…”
Section: Defenses Against Social Engineering Attackmentioning
confidence: 99%
“…Machine learning has evolved over several decades and there are many classifications of the techniques in the literature (Ahmad et al, 2021; Xiong et al, 2022). One of such general machine learning classifications is reported by Umenweke et al (2022).…”
Section: Overview Of Orc Plant and Data‐driven Modeling Approachmentioning
confidence: 99%