APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    What is Data Poisoning?

    Data poisoning attacks aim to damage the target model during training or retraining, which often occurs during the lifespan of a machine learning model.  

    What is Data Poisoning?

    By

    Apac CIOOutlook | Wednesday, October 13, 2021

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    Data poisoning attacks aim to damage the target model during training or retraining, which often occurs during the lifespan of a machine learning model.

    FREMONT, CA: While machine learning systems may be vulnerable to typical security risks at the hardware, application, and network levels, they may also be susceptible to domain-specific attacks that are currently unnoticed. One of the most significant risks they face is data poisoning. By introducing erroneous data into the training set, data poisoning attacks jeopardize the integrity of machine learning models. Let's understand the concept behind data poisoning and what's data poisoning attack?

    Data poisoning attack

    The quality and quantity of data used to train a machine learning model significantly impact its performance. A considerable quantity of training data is frequently necessary to prepare an appropriate machine learning model. In order to get adequate training data, practitioners may turn to potentially untrustworthy sources. The decrease in data quality, especially if the data didn't get systematically checked to verify the correctness of its labels, opens the door to data poisoning attacks, in which intentionally incorrectly labeled data gets inserted into a model's training set to compromise the model's accuracy.

    A data poisoning attack tries to change a training set such that the model trained with it makes erroneous predictions. Data poisoning attacks aim to damage the target model during training or retraining, which often occurs during the lifespan of a machine learning model. Data poisoning attacks have a long-term impact since they weaken the model's integrity and lead it to produce persistent mistakes while generating predictions at runtime. After a model has got poisoned, recovering from the attack later is a difficult task.

    Data poisoning attacks may get carried out against nearly any machine learning model that uses third-party data for training. The sensitivity of machine learning models to data poisoning attacks varies depending on a variety of factors. The capacity of the target model is one key characteristic that influences this vulnerability: simple models with limited capacity are more prone to denial-of-service poisoning attacks, whereas sophisticated models are more vulnerable to backdoor poisoning assaults. It means that there is no one-size-fits-all solution for protecting models against data poisoning attacks by design. To effectively minimize data poisoning assaults, an extra line of protection must get provided throughout the model's training phase.

    Model poisoning attacks, in addition to data poisoning attacks, may be carried out in distributed training settings such as federated learning setups.

    More in News

    Impact of Digital Transformation on Retail

    Impact of Digital Transformation on Retail

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Enhancing Customer Satisfaction through Omni-Channel Payments

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/what-is-data-poisoning-nwid-8510.html