4.7 Article

A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning

期刊

ACM COMPUTING SURVEYS
卷 55, 期 8, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3551636

关键词

Deep learning; federated learning; poisoning attack; backdoor attack

向作者/读者索取更多资源

The prosperity of machine learning has led to an increase in attacks on the training process, with poisoning attacks emerging as a significant threat. Defending against these attacks is challenging, and a systematic review from a unified perspective is lacking. This survey provides a comprehensive overview of poisoning attacks and countermeasures in both centralized and federated learning, categorizing attack methods based on goals and analyzing their differences and connections. Countermeasures in different learning frameworks are presented, along with a discussion of the feasibility of poisoning attacks and potential research directions.
The prosperity of machine learning has been accompanied by increasing attacks on the training process. Among them, poisoning attacks have become an emerging threat during model training. Poisoning attacks have profound impacts on the target models, e.g., making them unable to converge or manipulating their prediction results. Moreover, the rapid development of recent distributed learning frameworks, especially federated learning, has further stimulated the development of poisoning attacks. Defending against poisoning attacks is challenging and urgent. However, the systematic review from a unified perspective remains blank. This survey provides an in-depth and up-to-date overview of poisoning attacks and corresponding counter-measures in both centralized and federated learning. We firstly categorize attack methods based on their goals. Secondly, we offer detailed analysis of the differences and connections among the attack techniques. Furthermore, we present countermeasures in different learning framework and highlight their advantages and disadvantages. Finally, we discuss the reasons for the feasibility of poisoning attacks and address the potential research directions from attacks and defenses perspectives, separately.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据