Work place: Kalinga University, Raipur (CG), India
E-mail: lahe.akshay@gmail.com
Website: https://orcid.org/0000-0003-2387-9268
Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Systems Architecture, Data Structures and Algorithms, Analysis of Algorithms
Biography
Akshay Dilip Lahe is pursuing his Ph.D. from Kalinga University, Raipur (CG), India in Computer Science and Engineering. He received M.E. Degree in Computer Science and Engineering from Dr. Babasaheb Ambedkar Marathwada University, Aurangabad (MH). His research focuses on Privacy and Security of Systems along with user data and Machine Learning. He is currently an Assistant Professor at Saraswati College, Shegaon in Maharashtra.
By Akshay Dilip Lahe Guddi Singh
DOI: https://doi.org/10.5815/ijitcs.2023.02.03, Pub. Date: 8 Apr. 2023
In recent years, Machine learning is being used in various systems in wide variety of applications like Healthcare, Image processing, Computer Vision, Classifications, etc. Machine learning algorithms have shown that it can solve complex problem-solving capabilities close to humans or beyond humans as well. But recent studies show that Machine Learning Algorithms and models are vulnerable to various attacks which compromise security the systems. These attacks are hard to detect because they can hide in data at various stages of machine learning pipeline without being detected. This survey aims to analyse various security attacks on machine learning and categorize them depending on position of attacks in machine learning pipeline. This paper will focus on all aspects of machine learning security at various stages from training phase to testing phase instead of focusing on one type of security attack. Machine Learning pipeline, Attacker’s goals, Attacker’s knowledge, attacks on specified applications are considered in this paper. This paper also presented future scope of research of security attacks in machine learning. In this Survey paper, we concluded that Machine Learning Pipeline itself is vulnerable to different attacks so there is need to build a secure and robust Machine Learning Pipeline. Our survey has categorized these security attacks in details with respect to ML Pipeline stages.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals