Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models

06/19/2020
by   Josh Kalin, et al.
0

This work proposes a structured approach to baselining a model, identifying attack vectors, and securing the machine learning models after deployment. This method for securing each model post deployment is called the BAD (Build, Attack, and Defend) Architecture. Two implementations of the BAD architecture are evaluated to quantify the adversarial life cycle for a black box Sentiment Analysis system. As a challenging diagnostic, the Jigsaw Toxic Bias dataset is selected as the baseline in our performance tool. Each implementation of the architecture will build a baseline performance report, attack a common weakness, and defend the incoming attack. As an important note: each attack surface demonstrated in this work is detectable and preventable. The goal is to demonstrate a viable methodology for securing a machine learning model in a production setting.

READ FULL TEXT

page 7

page 8

research
06/08/2023

Re-aligning Shadow Models can Improve White-box Membership Inference Attacks

Machine learning models have been shown to leak sensitive information ab...
research
01/10/2023

The use of new technologies to support Public Administration. Sentiment analysis and the case of the app IO

App IO is an app developed for the Italian PA. It is definitely useful f...
research
09/19/2020

Learning to Attack: Towards Textual Adversarial Attacking in Real-world Situations

Adversarial attacking aims to fool deep neural networks with adversarial...
research
06/24/2019

Good Secretaries, Bad Truck Drivers? Occupational Gender Stereotypes in Sentiment Analysis

In this work, we investigate the presence of occupational gender stereot...
research
06/03/2023

Towards Black-box Adversarial Example Detection: A Data Reconstruction-based Method

Adversarial example detection is known to be an effective adversarial de...
research
02/19/2023

Adversarial Machine Learning: A Systematic Survey of Backdoor Attack, Weight Attack and Adversarial Example

Adversarial machine learning (AML) studies the adversarial phenomenon of...
research
12/22/2015

Facility Deployment Decisions through Warp Optimizaton of Regressed Gaussian Processes

A method for quickly determining deployment schedules that meet a given ...

Please sign up or login with your details

Forgot password? Click here to reset