Data Contamination Detection

Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests

Authors: Sean Kulinski, Saurabh Bagchi, David I. Inouye | Published: 2021-07-14
Data Contamination Detection
Concept Drift
Statistical Testing

Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks

Authors: Qin Ding, Cho-Jui Hsieh, James Sharpnack | Published: 2021-06-05 | Updated: 2023-01-30
Data Contamination Detection
Adversarial attack
Vulnerability Assessment Method

Gradient-based Data Subversion Attack Against Binary Classifiers

Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31
Data Contamination Detection
Poisoning
Optimization Methods

DeepMoM: Robust Deep Learning With Median-of-Means

Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08
Data Contamination Detection
Convergence Guarantee
Optimization Methods

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10
Data Contamination Detection
Poisoning
Vulnerability Assessment Method

GraphSAC: Detecting anomalies in large-scale graphs

Authors: Vassilis N. Ioannidis, Dimitris Berberidis, Georgios B. Giannakis | Published: 2019-10-21
Graph Representation Learning
Data Contamination Detection
Performance Evaluation

CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection

Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23
ML-Based IDS
Cyber Threat
Data Contamination Detection

A Grid Based Adversarial Clustering Algorithm

Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21
Data Contamination Detection
Adversarial Attack Analysis
Anomaly Detection Method