Cargando…
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study
BACKGROUND: A backdoor attack controls the output of a machine learning model in 2 stages. First, the attacker poisons the training data set, introducing a back door into the victim’s trained model. Second, during test time, the attacker adds an imperceptible pattern called a trigger to the input va...
Autores principales: | Joe, Byunggill, Park, Yonghyeon, Hamm, Jihun, Shin, Insik, Lee, Jiyeon |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
JMIR Publications
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9440413/ https://www.ncbi.nlm.nih.gov/pubmed/35984701 http://dx.doi.org/10.2196/38440 |
Ejemplares similares
-
Backdoor Attack against Face Sketch Synthesis
por: Zhang, Shengchuan, et al.
Publicado: (2023) -
Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning
por: Yang, Jie, et al.
Publicado: (2023) -
Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface
por: Oyama, Tatsuya, et al.
Publicado: (2023) -
Cerclage Septal Ablation for Hypertrophic Cardiomyopathy: Will a Backdoor Attack on the Septum Be Better?
por: Bach, Richard G.
Publicado: (2020) -
Backdoors for Linear Temporal Logic
por: Meier, Arne, et al.
Publicado: (2018)