2020
DOI: 10.1109/lcsys.2019.2921989
|View full text |Cite
|
Sign up to set email alerts
|

A Fundamental Performance Limitation for Adversarial Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Secure estimators (32,33) exploit sensor redundancy to always reconstruct a correct state estimate that can be used for resilient control. Data-based anomaly detection schemes based on machine learning methodologies are currently also an active research area (see, e.g., 34,35). Approaches for increasing the opportunities for detecting stealthy FDI attacks include moving-target defense (36) and multiplicative watermarking (37).…”
Section: Mitigationmentioning
confidence: 99%
“…Secure estimators (32,33) exploit sensor redundancy to always reconstruct a correct state estimate that can be used for resilient control. Data-based anomaly detection schemes based on machine learning methodologies are currently also an active research area (see, e.g., 34,35). Approaches for increasing the opportunities for detecting stealthy FDI attacks include moving-target defense (36) and multiplicative watermarking (37).…”
Section: Mitigationmentioning
confidence: 99%
“…We consider a d-dimensional binary classification problem formulated as hypothesis testing problem as in [13]. The objective is to decide whether an observation x ∈ R d belongs to class H 0 or class H 1 .…”
Section: Problem Setup and Preliminary Notionsmentioning
confidence: 99%
“…. , n, i = j, and u, v = 1, 2, which gives us (13). The KKT condition for dual feasibility implies that λ ≥ 0.…”
Section: Proofmentioning
confidence: 99%
“…Furthermore, recent works also point towards fundamental tradeoffs between accuracy and robustness of data-driven models [25][26][27][28] in various settings and training frameworks. The connection of adversarial robustness to model complexity and generalization, and the existence (or non-existence) of fundamental tradeoffs between them is another important problem that has received attention [29][30][31][32][33][34], and is the subject of ongoing debate.…”
Section: Introductionmentioning
confidence: 99%