A scalable comparison-shopping agent for the World-Wide Web
AGENTS '97 Proceedings of the first international conference on Autonomous agents
Wrappers for feature subset selection
Artificial Intelligence - Special issue on relevance
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss
Machine Learning - Special issue on learning with probabilistic representations
MetaCost: a general method for making classifiers cost-sensitive
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Robust Classification for Imprecise Environments
Machine Learning
Mining time-changing data streams
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Data Mining and Knowledge Discovery
Adaptive Image Analysis for Aerial Surveillance
IEEE Intelligent Systems
A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists
Information Retrieval
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Information awareness: a prospective technical assessment
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
"In vivo" spam filtering: a challenge problem for KDD
ACM SIGKDD Explorations Newsletter
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Beyond PageRank: machine learning for static ranking
Proceedings of the 15th international conference on World Wide Web
On privacy preservation against adversarial data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Toward harnessing user feedback for machine learning
Proceedings of the 12th international conference on Intelligent user interfaces
Evolutionary Function Approximation for Reinforcement Learning
The Journal of Machine Learning Research
Adaptive communal detection in search of adversarial identity crime
Proceedings of the 2007 international workshop on Domain driven data mining
Exploiting machine learning to subvert your spam filter
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters
The Journal of Machine Learning Research
Towards a theory of incentives in machine learning
ACM SIGecom Exchanges
Trusting spam reporters: A reporter-based reputation system for email filtering
ACM Transactions on Information Systems (TOIS)
Email Spam Filtering: A Systematic Review
Foundations and Trends in Information Retrieval
Open problems in the security of learning
Proceedings of the 1st ACM workshop on Workshop on AISec
Adversarial Pattern Classification Using Multiple Classifiers and Randomisation
SSPR & SPR '08 Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition
Decision Support Systems
Interacting meaningfully with machine learning systems: Three experiments
International Journal of Human-Computer Studies
Genre-based decomposition of email class noise
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Ensemble Based Data Fusion for Gene Function Prediction
MCS '09 Proceedings of the 8th International Workshop on Multiple Classifier Systems
Detecting spam blogs: a machine learning approach
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Online phishing classification using adversarial data mining and signaling games
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
AAAI'05 Proceedings of the 20th national conference on Artificial intelligence - Volume 2
Strategyproof classification under constant hypotheses: a tale of two functions
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
A framework for quantitative security analysis of machine learning
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Strategyproof classification with shared inputs
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
Information Technology and Management
Induction over Strategic Agents
Information Systems Research
Testing terrorism theory with data mining
International Journal of Data Analysis Techniques and Strategies
Online phishing classification using adversarial data mining and signaling games
ACM SIGKDD Explorations Newsletter
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
On the limits of dictatorial classification
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Machine learning in adversarial environments
Machine Learning
ICDM'10 Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects
Enhanced email spam filtering through combining similarity graphs
Proceedings of the fourth ACM international conference on Web search and data mining
Classifier evaluation and attribute selection against active adversaries
Data Mining and Knowledge Discovery
Inference control to protect sensitive information in text documents
ACM SIGKDD Workshop on Intelligence and Security Informatics
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Filtering artificial texts with statistical machine learning techniques
Language Resources and Evaluation
Proceedings of the 4th Workshop on Social Network Systems
Classifier evasion: models and open problems
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Detecting adversarial advertisements in the wild
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Spam detection using web page content: a new battleground
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Tight bounds for strategyproof classification
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
A unifying view on dataset shift in classification
Pattern Recognition
Information Systems Research
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
MCS'11 Proceedings of the 10th international conference on Multiple classifier systems
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Understanding the risk factors of learning in adversarial environments
Proceedings of the 4th ACM workshop on Security and artificial intelligence
On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
Thwarting the nigritude ultramarine: learning to identify link spam
ECML'05 Proceedings of the 16th European conference on Machine Learning
Paragraph: thwarting signature learning by training maliciously
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Multiple classifier systems under attack
MCS'10 Proceedings of the 9th international conference on Multiple Classifier Systems
Game-theoretic models of web credibility
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality
Survey on web spam detection: principles and algorithms
ACM SIGKDD Explorations Newsletter
Algorithms for strategyproof classification
Artificial Intelligence
Adversarial support vector machine learning
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Evasion attack of multi-class linear classifiers
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Query strategies for evading convex-inducing classifiers
The Journal of Machine Learning Research
An efficient adversarial learning strategy for constructing robust classification boundaries
AI'12 Proceedings of the 25th Australasian joint conference on Advances in Artificial Intelligence
An agent-based model to simulate and analyse behaviour under noisy and deceptive information
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
Security analysis of online centroid anomaly detection
The Journal of Machine Learning Research
Approaches to adversarial drift
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Genetic optimized artificial immune system in spam detection: a review and a model
Artificial Intelligence Review
Hi-index | 0.00 |
Essentially all data mining algorithms assume that the data-generating process is independent of the data miner's activities. However, in many domains, including spam detection, intrusion detection, fraud detection, surveillance and counter-terrorism, this is far from the case: the data is actively manipulated by an adversary seeking to make the classifier produce false negatives. In these domains, the performance of a classifier can degrade rapidly after it is deployed, as the adversary learns to defeat it. Currently the only solution to this is repeated, manual, ad hoc reconstruction of the classifier. In this paper we develop a formal framework and algorithms for this problem. We view classification as a game between the classifier and the adversary, and produce a classifier that is optimal given the adversary's optimal strategy. Experiments in a spam detection domain show that this approach can greatly outperform a classifier learned in the standard way, and (within the parameters of the problem) automatically adapt the classifier to the adversary's evolving manipulations.