Secure and resilient distributed machine learning under adversarial environments

Rui Zhang, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With a large number of sensors and control units in networked systems, the decentralized computing algorithms play a key role in scalable and efficient data processing for detection and estimation. The well-known algorithms are vulnerable to adversaries who can modify and generate data to deceive the system to misclassify or misestimate the information from the distributed data processing. This work aims to develop secure, resilient and distributed machine learning algorithms under adversarial environment. We establish a game-theoretic framework to capture the conflicting interests between the adversary and a set of distributed data processing units. The Nash equilibrium of the game allows predicting the outcome of learning algorithms in adversarial environment, and enhancing the resilience of the machine learning through dynamic distributed learning algorithms. We use Spambase Dataset to illustrate and corroborate our results.

Original languageEnglish (US)
Title of host publication2015 18th International Conference on Information Fusion, Fusion 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages644-651
Number of pages8
ISBN (Electronic)9780982443866
StatePublished - Sep 14 2015
Event18th International Conference on Information Fusion, Fusion 2015 - Washington, United States
Duration: Jul 6 2015Jul 9 2015

Publication series

Name2015 18th International Conference on Information Fusion, Fusion 2015
Volume2015-January

Conference

Conference18th International Conference on Information Fusion, Fusion 2015
Country/TerritoryUnited States
CityWashington
Period7/6/157/9/15

ASJC Scopus subject areas

  • Information Systems
  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure and resilient distributed machine learning under adversarial environments'. Together they form a unique fingerprint.

Cite this