About Trustworthy Machine Learning.org08 Oct 2020
Scope of problems our tools aim to tackle
Classifiers based on machine learning algorithms have shown promising results for many security tasks including malware classification and network intrusion detection, but classic machine learning algorithms are not designed to operate in the presence of adversaries. Intelligent and adaptive adversaries may actively manipulate the information they present in attempts to evade a trained classifier, leading to a competition between the designers of learning systems and attackers who wish to evade them. This project is developing automated techniques for predicting how well classifiers will resist the evasions of adversaries, along with general methods to automatically harden machine-learning classifiers against adversarial evasion attacks.
Five important tasks
At the junction between machine learning and computer security, this project involves toolboxes for five main task as shown in the following table. Our system aims to allow a classifier designer to understand how the classification performance of a model degrades under evasion attacks, enabling better-informed and more secure design choices. The framework is general and scalable, and takes advantage of the latest advances in machine learning and computer security.
|No.||Tool Name||Short Description||Venues|
|1||Evade Machine Learning||Tools we designed to Automatically Evade Classifiers||NDSS16 + DeepSecureWkp18|
|2||Detect Adversarial Attacks||Tools we designed for Detecting~Adversarial~Examples~in~Deep~Neural~Networks||NDSS18|
|3||Defense against Adversarial Attacks||Tools we designed for defending against Adversarial Examples in Deep Neural Networks||ICLRwkp17|
|4||Visualize Adversarial Attacks||Tools we designed for Visualizing Adversarial Examples||VizSec17|
|5||Theorems of Adversarial Machine Learning||Theorems we proposed for understanding Adversarial Examples in Machine Learning||ICLRwkp17|
Thanks for reading!