Supercharge Your Innovation With Domain-Expert AI Agents!

Proactive defense of untrustworthy machine learning system

A machine learning model and computer technology, applied in transmission systems, integrated learning, instruments, etc.

Pending Publication Date: 2021-05-11
VISA INT SERVICE ASSOC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Model shifting prevents malicious computers from performing malicious attacks using malicious machine learning models

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proactive defense of untrustworthy machine learning system
  • Proactive defense of untrustworthy machine learning system
  • Proactive defense of untrustworthy machine learning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following paragraphs introduce some concepts that may be helpful in understanding embodiments of the present invention, model shifting, and improvements over conventional methods and systems. refer to figure 1 Simplified support vector machines in present an example of model shift. After this introduction, refer to figure 2 -6 describes the method and system according to the embodiment in more detail.

[0034] Current anti-fraud systems (eg, CAPTCHAs) are vulnerable to exploitation by malicious entities (eg, hackers). By training a machine learning classifier, a malicious entity can generate classified data that allows the malicious entity to perform malicious actions. Malicious entities can use machine learning classifiers to classify images or alphanumeric characters to bypass CAPTCHA systems. For example, a CAPTCHA can present a series of images to a user attempting to register an email address. CAPTCHA can present 16 images, 5 of which include dogs. The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for inducing model shift in a malicious computer's machine learning model is disclosed. A data processor can determine that a malicious computer uses a machine learning model with a boundary function to determine outcomes. The data processor can then generate transition data intended to shift the boundary function and then provide the transition data to the malicious computer. The data processor can repeat generating and providing the transition data, thereby causing the boundary function to shift over time.

Description

Background technique [0001] As machine learning systems become more robust, efficient, and accurate, machine learning has been applied to a growing number of academic, industrial, and security applications. Specifically, machine learning classifiers have been increasingly used to automate complex processes that require deliberate decision-making. [0002] A machine learning classifier is a machine learning model that learns to distinguish between input data belonging to multiple categories. For example, machine learning classifiers can be used to classify real versus fake news stories, legitimate email versus spam, various images (for example, between an image of a dog versus an image of a cat), or alphanumeric characters. distinguish. During the training phase, a machine learning classifier learns to recognize patterns in labeled training data. Later, in the output phase, machine learning classifiers can use these identified patterns to produce classified data correspondin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06N20/10G06F21/55
CPCG06F21/554H04L63/1408G06N20/10G06N20/20H04L63/1441G06F2221/2133G06N5/01G06N3/044G06N3/08
Inventor A·盖达姆A·叶尔马克扬P·乔葛蕾卡
Owner VISA INT SERVICE ASSOC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More