Attack Transferability Against Information-Theoretic Feature Selection

Srishti Gupta, Roman Golota, Gregory Ditzler

Research output: Contribution to journalArticlepeer-review

Abstract

Machine learning (ML) is vital to many application-driven fields, such as image and signal classification, cyber-security, and health sciences. Unfortunately, many of these fields can easily have their training data tampered with by an adversary to thwart an ML algorithm’s objective. Further, the adversary can impact any stage in an ML pipeline (e.g., preprocessing, learning, and classification). Recent work has shown that many models can be attacked by poisoning the training data, and the impact of the poisoned data can be quite significant. Prior works on adversarial feature selection have shown that the attacks can damage feature selection (FS). Filter FS algorithms, a type of FS, are widely used for their ability to model nonlinear relationships, classifier independence and lower computational requirements. One important question from the security perspective of these widely used approaches is, whether filter FS algorithms are robust against other FS attacks. In this work, we focus on the task of information-theoretic filter FS such MIM, MIFS, and mRMR, and the impact that gradient-based attack can have on these selections. The experiments on five benchmark datasets demonstrate that the stability of different information-theoretic algorithms can be significantly degraded by injecting poisonous data into the training dataset.

Original languageEnglish (US)
JournalIEEE Access
DOIs
StateAccepted/In press - 2021
Externally publishedYes

Keywords

  • Adversarial Machine Learning
  • Feature Selection
  • Feature extraction
  • Information Theory
  • Machine learning algorithms
  • Pipelines
  • Stability analysis
  • Task analysis
  • Training
  • Training data

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Fingerprint

Dive into the research topics of 'Attack Transferability Against Information-Theoretic Feature Selection'. Together they form a unique fingerprint.

Cite this