Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection.
Andrea PaudiceLuis Muñoz-GonzálezAndrás GyörgyEmil C. LupuPublished in: CoRR (2018)
Keyphrases
- transfer learning
- anomaly detection
- training examples
- labeled data
- active learning
- learning algorithm
- network anomaly detection
- misuse detection
- unlabeled data
- normal behavior
- semi supervised learning
- computer security
- training data
- intrusion detection
- semi supervised
- supervised learning
- normal traffic
- small number
- network intrusion
- anomalous behavior
- network intrusion detection
- detecting anomalous
- detecting anomalies
- training set
- network traffic
- intrusion detection system
- detect anomalies
- support vector
- machine learning
- unsupervised learning
- training samples
- one class support vector machines
- object categories
- intrusion prevention
- network security
- data mining
- prior knowledge
- high dimensional
- data sets
- support vector machine
- neural network