Smart City Gnosys

Smart city article details

Title Securing Machine Learning Against Data Poisoning Attacks
ID_Doc 47762
Authors Allheeib N.
Year 2024
Published International Journal of Data Warehousing and Mining, 20, 1
DOI http://dx.doi.org/10.4018/IJDWM.358335
Abstract The emergence of intelligent networks has revolutionized the use of machine learning (ML), allowing it to be applied in various domains of human life. This literature review paper provides in-depth analysis of the existing research on data poisoning attacks and examines how intelligent networks can mitigate these threats. Specifically, the author explores how malicious users inject fake training data into adversarial networks, a technique known as a data poisoning attack, which can severely compromise the model’s integrity. Through a comparative evaluation of the attack strategies and defense mechanisms, such as robust optimization and model-based detection, the author assesses the strengths and limitations of current defenses. Real-world applications are discussed, including the use of these networks in cybersecurity, healthcare, and smart city systems. The author concludes by outlining the challenges and future directions in developing more effective defense strategies to detect and mitigate data poisoning attacks in real time, ensuring the security and privacy of intelligent networks. © 2024 IGI Global. All rights reserved.
Author Keywords Adversarial Machine Learning; Data Poisoning Attack; Defense Strategies; Emerging Security Challenges; Security Threats


Similar Articles


Id Similarity Authors Title Published
6672 View0.87Kodali R.K.; Kumar S.; Inumula K.M.; Ponce L.A.H.Advancing Machine Learning And Deep Learning Techniques For Predictive Analytics In Cyber Security And Data Science ApplicationsJournal of Information Systems Engineering and Management, 10 (2025)
6056 View0.865Haque M.A.; Ahmad S.; Sonal D.; Abdeljaber H.A.M.; Mishra B.K.; Eljialy A.E.M.; Alanazi S.; Nazeer J.Achieving Organizational Effectiveness Through Machine Learning Based Approaches For Malware Analysis And Detection; [Lograr La Eficacia Organizativa Mediante Enfoques Basados En El Aprendizaje Automático Para El Análisis Y La Detección De Malware]Data and Metadata, 2 (2023)
6741 View0.853Rashid M.M.; Kamruzzaman J.; Mehedi Hassan M.; Imam T.; Wibowo S.; Gordon S.; Fortino G.Adversarial Training For Deep Learning-Based Cyberattack Detection In Iot-Based Smart City ApplicationsComputers and Security, 120 (2022)
814 View0.852Basheer L.; Ranjana P.A Comparative Study Of Various Intrusion Detections In Smart Cities Using Machine Learning2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)