2018
DOI: 10.1109/tit.2018.2806742
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Source Identification Game With Corrupted Training

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…We also mention the case of unknown sources, where the source statistics are estimated from training data, possibly corrupted by the attacker. In this scenario, the detection game has been studied for a partially active case, with both uncorrupted and corrupted training data [13,14]. The extension of such analyses to the fully active scenario represents a further interesting direction for future research.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We also mention the case of unknown sources, where the source statistics are estimated from training data, possibly corrupted by the attacker. In this scenario, the detection game has been studied for a partially active case, with both uncorrupted and corrupted training data [13,14]. The extension of such analyses to the fully active scenario represents a further interesting direction for future research.…”
Section: Discussionmentioning
confidence: 99%
“…Some variants of this attack-detection game have also been studied; for instance, in [13], the setting is extended to the case where the sources are known to neither the defender nor the attacker, while the training data from both sources are available to both parties. Within this framework, the case where part of the training data available to the defender is corrupted by the attacker has also been studied (see [14]).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we conclude with the note that anomaly detection problems involve adversarial aspects (e.g., adversarial signal processing, adversarial hypothesis testing) which involve adversaries (intruders) who change their strategies over time. For a glimpse of such research areas, we refer to References 72‐75. Naturally, machine learning techniques play a pivotal role in these areas.…”
Section: A Summary and Potential Extensionsmentioning
confidence: 99%
“…Game theory has also been used in many other contiguous security-related fields, e.g., in watermarking [37] and multimedia forensics [38,39]. A game-theoretic framework to account for the presence of adversaries in general binary detection problems has been studied in [40,41]. The game-theoretic approach followed in this paper is similar to the one adopted in [42], where the problem of data fusion in the presence of malicious nodes is studied.…”
Section: Prior Art On Game Theory In Related Security Areasmentioning
confidence: 99%