Training-Time Attacks against k-Nearest Neighbors

08/15/2022
by   Ara Vartanian, et al.
0

Nearest neighbor-based methods are commonly used for classification tasks and as subroutines of other data-analysis methods. An attacker with the capability of inserting their own data points into the training set can manipulate the inferred nearest neighbor structure. We distill this goal to the task of performing a training-set data insertion attack against k-Nearest Neighbor classification (kNN). We prove that computing an optimal training-time (a.k.a. poisoning) attack against kNN classification is NP-Hard, even when k = 1 and the attacker can insert only a single data point. We provide an anytime algorithm to perform such an attack, and a greedy algorithm for general k and attacker budget. We provide theoretical bounds and empirically demonstrate the effectiveness and practicality of our methods on synthetic and real-world datasets. Empirically, we find that kNN is vulnerable in practice and that dimensionality reduction is an effective defense. We conclude with a discussion of open problems illuminated by our analysis.

READ FULL TEXT
research
10/12/2021

Finding Relevant Points for Nearest-Neighbor Classification

In nearest-neighbor classification problems, a set of d-dimensional trai...
research
05/29/2022

A Model of One-Shot Generalization

We provide a theoretical framework to study a phenomenon that we call on...
research
02/16/2018

Recognizing Cuneiform Signs Using Graph Based Methods

The cuneiform script constitutes one of the earliest systems of writing ...
research
03/09/2023

Greedy Heuristics Adapted for the Multi-commodity Pickup and Delivery Traveling Salesman Problem

The Multi-Commodity One-to-One Pickup and Delivery Traveling Salesman Pr...
research
01/16/2013

Combining Feature and Prototype Pruning by Uncertainty Minimization

We focus in this paper on dataset reduction techniques for use in k-near...
research
02/11/2021

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors

State-of-the-art machine learning models are vulnerable to data poisonin...
research
06/27/2021

ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense

K-Nearest Neighbor (kNN)-based deep learning methods have been applied t...

Please sign up or login with your details

Forgot password? Click here to reset