Adversarial Missingness Attacks on Causal Structure Learning
Abstract
References
Index Terms
- Adversarial Missingness Attacks on Causal Structure Learning
Recommendations
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningCausality-informed machine learning has been proposed as an avenue for achieving many of the goals of modern machine learning, from ensuring generalization under domain shifts to attaining fairness, robustness, and interpretability. A key component of ...
Defending Against Adversarial Denial-of-Service Data Poisoning Attacks
DYNAMICS '20: Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber SecurityData poisoning is one of the most relevant security threats against machine learning and data-driven technologies. Since many applications rely on untrusted training data, an attacker can easily craft malicious samples and inject them into the training ...
Data poisoning attacks against machine learning algorithms
AbstractFor the past decade, machine learning technology has increasingly become popular and it has been contributing to many areas that have the potential to influence the society considerably. Generally, machine learning is used by various ...
Highlights- A new approach to analyze robustness of machine learning.
- Machine learning ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Transactions on Intelligent Systems and Technology](/cms/asset/bba4a809-96ba-4a35-8b64-af5ea13d21e8/3613712.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 216Total Downloads
- Downloads (Last 12 months)216
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in