Los puntos clave no están disponibles para este artículo en este momento.
Essentially all data mining algorithms assume that the data-generating process is independent of the data miner's activities. However, in many domains, including spam detection, intrusion detection, fraud detection, surveillance and counter-terrorism, this is far from the case: the data is actively manipulated by an adversary seeking to make the classifier produce false negatives. In these domains, the performance of a classifier can degrade rapidly after it is deployed, as the adversary learns to defeat it. Currently the only solution to this is repeated, manual, ad hoc reconstruction of the classifier. In this paper we develop a formal framework and algorithms for this problem. We view classification as a game between the classifier and the adversary, and produce a classifier that is optimal given the adversary's optimal strategy. Experiments in a spam detection domain show that this approach can greatly outperform a classifier learned in the standard way, and (within the parameters of the problem) automatically adapt the classifier to the adversary's evolving manipulations.
Building similarity graph...
Analyzing shared references across papers
Loading...
Nilesh Dalvi
Pedro Domingos
Mausam Mausam
University of Washington
Seattle University
Building similarity graph...
Analyzing shared references across papers
Loading...
Dalvi et al. (Sun,) studied this question.
www.synapsesocial.com/papers/6a08caae60378a53cb66bbfe — DOI: https://doi.org/10.1145/1014052.1014066
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: