A novel perturbation attack on SVM by greedy algorithm
With the increasing concern of machine learning security issues, an adversarial sample generation method for SVM was proposed. This attack occurred in the testing stage by manipulating with the sample tofool the SVM classification model. Greedy strategy was used to search for salient feature subsets...
Saved in:
Main Authors: | Yaguan QIAN, Xiaohui GUAN, Shuhui WU, NBensheng YU, Dongxiao REN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2019-01-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2019014/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Internet traffic classification using SVM with flexible feature space
by: Yaguan QIAN, et al.
Published: (2016-05-01) -
Greedy algorithms: a review and open problems
by: Andrea García
Published: (2025-02-01) -
SVM classifier for telecom user arrears based on boundary samples-based under-sampling approaches
by: Chuangchuang LI, et al.
Published: (2017-09-01) -
3-PARAMETER WEIBULL DISTRIBUTION ESTIMATION BASED ON GM AND SVM
by: GAO Bin, et al.
Published: (2018-01-01) -
An Optimal Greedy Algorithm for the Single Access Contention Resolution Problem
by: Itzel C. Olivos-Castillo, et al.
Published: (2019-01-01)