Color Teams for Machine Learning Development

10/20/2021
by   Josh Kalin, et al.
0

Machine learning and software development share processes and methodologies for reliably delivering products to customers. This work proposes the use of a new teaming construct for forming machine learning teams for better combatting adversarial attackers. In cybersecurity, infrastructure uses these teams to protect their systems by using system builders and programmers to also offer more robustness to their platforms. Color teams provide clear responsibility to the individuals on each team for which part of the baseline (Yellow), attack (Red), and defense (Blue) breakout of the pipeline. Combining colors leads to additional knowledge shared across the team and more robust models built during development. The responsibilities of the new teams Orange, Green, and Purple will be outlined during this paper along with an overview of the necessary resources for these teams to be successful.

READ FULL TEXT

page 2

page 3

page 6

research
02/27/2017

Synergistic Team Composition

Effective teams are crucial for organisations, especially in environment...
research
04/19/2022

Structured and Unstructured Teams for Research Software Development at the Netherlands eScience Center

This paper presents the types of teams that are currently in place at th...
research
03/28/2021

An In-memory Embedding of CPython for Offensive Use

We offer an embedding of CPython that runs entirely in memory without "t...
research
08/10/2022

TagTeam: Towards Wearable-Assisted, Implicit Guidance for Human–Drone Teams

The availability of sensor-rich smart wearables and tiny, yet capable, u...
research
08/24/2022

Indirect social learning through collective performance favors decentralization

Many models of learning in teams assume that team members can share solu...
research
02/03/2023

PyGlove: Efficiently Exchanging ML Ideas as Code

The increasing complexity and scale of machine learning (ML) has led to ...
research
03/29/2021

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Image classification is a common step in image recognition for machine l...

Please sign up or login with your details

Forgot password? Click here to reset