Multifaceted Characterization and Enhancement of Machine Learning Security
dc.contributor.author | Amich, Abderrahmen | |
dc.contributor.advisor | Eshete, Birhanu | |
dc.date.accessioned | 2024-12-23T17:12:29Z | |
dc.date.issued | 2024-12-21 | |
dc.date.submitted | 2024-10-31 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/195974 | |
dc.description.abstract | "Machine Learning (ML) has seen a widespread success in various domains, ranging from object recognition to forecasting. Its use in critical applications like self-driving cars and malware detection has raised concerns about its security and privacy, particularly regarding susceptibility to evasion attacks. These attacks exploit input feature perturbations to mislead ML models. Prior studies have highlighted both attack methods and defenses, illustrating an ongoing arms race. To address ML robustness, we use ML explainers to analyze how feature perturbations impact model predictions, revealing that not all changes are effective in evading models. Based on this insight, we developed the ”Explanation-Guided Booster” (EG-Booster), which enhances the effectiveness of evasion attacks, making them more useful for security risk assessments. On the defense side, we introduced ”Morphence,” a moving target defense strategy that significantly improves ML robustness and outperforms existing approaches. We also investigate the relationship between Out-of-Distribution (OOD) generalization issues and adversarial vulnerabilities. Using Image-to-Image translation through generative adversarial networks (GANs), we propose an OOD generalization approach that also counters adversarial examples. Additionally, we leverage the graph structure of Deep Neural Networks (DNNs) to analyze runtime behavior, distinguishing between different patterns in benign and adversarial settings to guide repair actions for improved robustness. Moreover, we explore novel uses for adversarial examples beyond attacks. Specifically, we propose ”DeResistor,” a system that utilizes adversarial techniques to help evade internet censorship detection. Finally, we outline directions for future research to further enhance ML security and robustness" | en_US |
dc.language.iso | en_US | en_US |
dc.subject | ML Trustworthiness | en_US |
dc.subject | ML Security | en_US |
dc.subject | Adversarial Examples | en_US |
dc.subject.other | Computer and Information Science | en_US |
dc.title | Multifaceted Characterization and Enhancement of Machine Learning Security | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Eshete, Birhanu | |
dc.contributor.committeemember | Ma, Di | |
dc.contributor.committeemember | Malik, Hafiz | |
dc.contributor.committeemember | Lu, Jin | |
dc.identifier.uniqname | aamich | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/195974/1/Amich_Dissertation_Multifaceted_Characterization.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/24910 | |
dc.description.mapping | febc42ae-d444-43ae-98fd-dc98ee638897 | en_US |
dc.identifier.orcid | 0000-0002-7288-4509 | en_US |
dc.description.filedescription | Description of Amich_Dissertation_Multifaceted_Characterization.pdf : Dissertation | |
dc.identifier.name-orcid | Amich, Abderrahmen; 0000-0002-7288-4509 | en_US |
dc.working.doi | 10.7302/24910 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.