A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data.
Tomoki ChibaYuichi SeiYasuyuki TaharaAkihiko OhsugaPublished in: AIKE (2020)
Keyphrases
- synthetic data
- input data
- machine learning
- statistical methods
- data sets
- test data
- knowledge discovery
- pairwise
- database
- data collection
- noisy data
- prior information
- missing values
- machine learning methods
- data points
- data structure
- data analysis
- preprocessing
- prior knowledge
- watermarking method
- data mining
- objective function
- missing data
- clustering method
- statistical analysis
- data processing
- semi supervised learning
- model selection
- training data
- big data
- network security
- dimensionality reduction