Cargando…

Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study

BACKGROUND: A backdoor attack controls the output of a machine learning model in 2 stages. First, the attacker poisons the training data set, introducing a back door into the victim’s trained model. Second, during test time, the attacker adds an imperceptible pattern called a trigger to the input va...

Descripción completa

Detalles Bibliográficos
Autores principales: Joe, Byunggill, Park, Yonghyeon, Hamm, Jihun, Shin, Insik, Lee, Jiyeon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: JMIR Publications 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9440413/
https://www.ncbi.nlm.nih.gov/pubmed/35984701
http://dx.doi.org/10.2196/38440