SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising

Poongodi Manoharan*, Ranjan Walia, Celestine Iwendi*, Tariq Ahamed Ahanger, S. T. Suganthi, M. M. Kamruzzaman*, Sami Bourouis, Wajdi Alhakami, Mounir Hamdi

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

38 Citations (Scopus)

Abstract

Machine learning are vulnerable to the threats. The Intruders can utilize the malicious nature of the nodes to attack the training dataset to worsen the process and manipulate the learning and make the over all system with less efficiency and performance. The optimized poison attack procedures are already introduced to estimate the overall bad scenario, design the intrusion as bi-level optimization and it is considered computational complexity is high and demanding, in contrary the applicability is limited such models deep neural networks. In this research papers, we have proposed, novel proposed system, poisoning attacks against the Machine learning training dataset, including the genuine data points that reduce the accuracy of the classifier in the process of training. The proposed system have 3 components of Generative Adverserial networks (GAN) generator, discriminator, and the target classifier. The proposed system allows to detect the vulnerability easy and it can be found as similar as realistic attacks to detect the area where the underlying data distribution have more possibility of poising attack which cause vulnerability to the network. Our experimentation, proves the claim our that the proposed model is effective on compromising the classifiers uses the machine learning algorithms and also deep learning networks.

Original languageEnglish
Article numbere13072
Number of pages14
JournalExpert Systems
Volume40
Issue number5
DOIs
Publication statusPublished - Jun 2023

Keywords

  • Edge computing
  • Federated learning
  • Generative adversarial network
  • Poisoning attack

Fingerprint

Dive into the research topics of 'SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising'. Together they form a unique fingerprint.

Cite this