2023
DOI: 10.1609/aaai.v37i12.26771
|View full text |Cite
|
Sign up to set email alerts
|

Conflicting Interactions among Protection Mechanisms for Machine Learning Models

Abstract: Nowadays, systems based on machine learning (ML) are widely used in different domains. Given their popularity, ML models have become targets for various attacks. As a result, research at the intersection of security/privacy and ML has flourished. Typically such work has focused on individual types of security/privacy concerns and mitigations thereof. However, in real-life deployments, an ML model will need to be protected against several concerns simultaneously. A protection mechanism optimal for a specific s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…While the literature offers many different methods for defending machine learning models, there are few studies that explore building models combining multiple defense methods. In the paper [47] the authors examine the possibility of combining the most popular defense methods against evasion and poisoning attacks. The research concludes that many methods, at the level of algorithmic ideas, are incompatible, demonstrating this through practical examples.…”
Section: Interactions Among Defense Methodsmentioning
confidence: 99%
“…While the literature offers many different methods for defending machine learning models, there are few studies that explore building models combining multiple defense methods. In the paper [47] the authors examine the possibility of combining the most popular defense methods against evasion and poisoning attacks. The research concludes that many methods, at the level of algorithmic ideas, are incompatible, demonstrating this through practical examples.…”
Section: Interactions Among Defense Methodsmentioning
confidence: 99%