Skip to main content

Showing 1–9 of 9 results for author: Kantardzic, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1803.09163  [pdf, other

    cs.LG cs.CR stat.ML

    Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu

    Abstract: The increasing scale and sophistication of cyberattacks has led to the adoption of machine learning based classification techniques, at the core of cybersecurity systems. These techniques promise scale and accuracy, which traditional rule or signature based methods cannot. However, classifiers operating in adversarial domains are vulnerable to evasion attacks by an adversary, who is capable of lea… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: Pacific-Asia Workshop on Intelligence and Security Informatics. Springer, Cham, 2017

  2. arXiv:1803.09162  [pdf, other

    cs.LG cs.CR stat.ML

    A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen

    Abstract: Operating in a dynamic real world environment requires a forward thinking and adversarial aware design for classifiers, beyond fitting the model to the training data. In such scenarios, it is necessary to make classifiers - a) harder to evade, b) easier to detect changes in the data distribution over time, and c) be able to retrain and recover from model degradation. While most works in the securi… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 2018

  3. arXiv:1803.09160  [pdf, other

    cs.LG cs.CR stat.ML

    Handling Adversarial Concept Drift in Streaming Data

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic

    Abstract: Classifiers operating in a dynamic, real world environment, are vulnerable to adversarial activity, which causes the data distribution to change over time. These changes are traditionally referred to as concept drift, and several approaches have been developed in literature to deal with the problem of drift handling and detection. However, most concept drift handling techniques, approach it as a d… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: Journal paper

    Journal ref: Expert Systems with Applications 97 (2018): 18-40

  4. arXiv:1704.00023  [pdf, other

    stat.ML cs.AI cs.LG

    On the Reliable Detection of Concept Drift from Streaming Unlabeled Data

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic

    Abstract: Classifiers deployed in the real world operate in a dynamic environment, where the data distribution can change over time. These changes, referred to as concept drift, can cause the predictive performance of the classifier to drop over time, thereby making it obsolete. To be of any real use, these classifiers need to detect drifts and be able to adapt to them, over time. Detecting drifts has tradi… ▽ More

    Submitted 31 March, 2017; originally announced April 2017.

  5. arXiv:1703.10579  [pdf

    cs.AI cs.HC

    Evaluating Complex Task through Crowdsourcing: Multiple Views Approach

    Authors: Lingyu Lyu, Mehmed Kantardzic

    Abstract: With the popularity of massive open online courses, grading through crowdsourcing has become a prevalent approach towards large scale classes. However, for getting grades for complex tasks, which require specific skills and efforts for grading, crowdsourcing encounters a restriction of insufficient knowledge of the workers from the crowd. Due to knowledge limitation of the crowd graders, grading b… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: 8 pages, 13 figures, the paper is accepted by ICCSE 2016

  6. Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic

    Abstract: While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication of attacks, has prompted the need for a data driven solution, with machine learning forming the core of many cybersecurity systems. Machine learn… ▽ More

    Submitted 22 March, 2017; originally announced March 2017.

  7. arXiv:1107.5236  [pdf, other

    cs.LG cs.AI

    Submodular Optimization for Efficient Semi-supervised Support Vector Machines

    Authors: Wael Emara, Mehmed Kantardzic

    Abstract: In this work we present a quadratic programming approximation of the Semi-Supervised Support Vector Machine (S3VM) problem, namely approximate QP-S3VM, that can be efficiently solved using off the shelf optimization packages. We prove that this approximate formulation establishes a relation between the low density separation and the graph-based models of semi-supervised learning (SSL) which is imp… ▽ More

    Submitted 23 August, 2011; v1 submitted 26 July, 2011; originally announced July 2011.

  8. arXiv:0707.1083  [pdf, ps, other

    cs.NI cs.IR

    Delayed Correlations in Inter-Domain Network Traffic

    Authors: Viktoria Rojkova, Mehmed Kantardzic

    Abstract: To observe the evolution of network traffic correlations we analyze the eigenvalue spectra and eigenvectors statistics of delayed correlation matrices of network traffic counts time series. Delayed correlation matrix D is composed of the correlations between one variable in the multivariable time series and another at a time delay τ. Inverse participation ratio (IPR) of eigenvectors of D deviate… ▽ More

    Submitted 7 July, 2007; originally announced July 2007.

    Comments: submitted to CoNext 2007

  9. arXiv:0706.2520  [pdf, ps, other

    cs.NI

    Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory Approach

    Authors: Viktoria Rojkova, Mehmed Kantardzic

    Abstract: The traffic behavior of University of Louisville network with the interconnected backbone routers and the number of Virtual Local Area Network (VLAN) subnets is investigated using the Random Matrix Theory (RMT) approach. We employ the system of equal interval time series of traffic counts at all router to router and router to subnet connections as a representation of the inter-VLAN traffic. The… ▽ More

    Submitted 17 June, 2007; originally announced June 2007.

    Comments: submitted to Internet Measurement Conference 2007