Machine learning (ML) is vital to many application-driven fields, such as image and signal classification, cyber-security, and health sciences. Unfortunately, many of these fields can easily have their training data tampered with by an adversary to thwart an ML algorithm’s objective. Further, the adversary can impact any stage in an ML pipeline (e.g., preprocessing, learning, and classification). Recent work has shown that many models can be attacked by poisoning the training data, and the impact of the poisoned data can be quite significant. Prior works on adversarial feature selection have shown that the attacks can damage feature selection (FS). Filter FS algorithms, a type of FS, are widely used for their ability to model nonlinear relationships, classifier independence and lower computational requirements. One important question from the security perspective of these widely used approaches is, whether filter FS algorithms are robust against other FS attacks. In this work, we focus on the task of information-theoretic filter FS such MIM, MIFS, and mRMR, and the impact that gradient-based attack can have on these selections. The experiments on five benchmark datasets demonstrate that the stability of different information-theoretic algorithms can be significantly degraded by injecting poisonous data into the training dataset.
S. Gupta, R. Golota and G. Ditzler, "Attack Transferability Against Information-Theoretic Feature Selection," in IEEE Access, vol. 9, pp. 115885-115894, 2021, doi: 10.1109/ACCESS.2021.3105555.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.
IEEE is not the copyright holder of this material. Open Access under a https://creativecommons.org/licenses/by/4.0/ license.