Privacy and Security in Machine Learning

A special issue of Machine Learning and Knowledge Extraction (ISSN 2504-4990).

Deadline for manuscript submissions: closed (31 October 2018) | Viewed by 10683

Special Issue Editors


E-Mail Website1 Website2
Guest Editor
SBA Research, University of Vienna, 1040 Vienna, Austria
Interests: information security

E-Mail Website1 Website2
Guest Editor
Department of Information Engineering, Infrastructures and Sustainable Energy (DIIES), University Mediterranea of Reggio Calabria, 89122 Reggio Calabria, Italy
Interests: cybersecurity; trust; privacy; cloud security; security in e-government

Special Issue Information

Dear Colleagues,

Machine learning is clearly a research area that will continue creating real-world impacts, as computing power becomes increasingly more readily available. Security and privacy considerations, however, are vital, in particular since machine learning algorithms are often perceived as magical black boxes, in which the inner workings are not easily made transparent. Important topics that warrant new research are, among others:

  • The right to be forgotten. How much of the “original” personal data is embedded in trained neural networks? Can we delete this data without retraining? How can we measure the anonymity/pseudonymity of training data embedded in a trained network?
  • How easy is it to attack training sets and trained networks? If ML is used for real-world applications such as autonomous driving, successful attacks may have huge impact.

We look forward to receiving research papers that address, not only the aforementioned examples, but also any excellent research that investigates privacy and security aspects in ML in depth.

Prof. Dr. Edgar Weippl
Prof. Dr. Francesco Buccafurri
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Machine Learning and Knowledge Extraction is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Threat models
  • Attacks against machine learning
  • Malware detection
  • Black-box attacks against machine learning
  • Adversarial training and defensive distillation
  • Privacy-preserving machine learning
  • Application of machine learning to security and privacy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 3025 KiB  
Article
A Survey on GAN Techniques for Data Augmentation to Address the Imbalanced Data Issues in Credit Card Fraud Detection
by Emilija Strelcenia and Simant Prakoonwit
Mach. Learn. Knowl. Extr. 2023, 5(1), 304-329; https://doi.org/10.3390/make5010019 - 11 Mar 2023
Cited by 23 | Viewed by 9649
Abstract
Data augmentation is an important procedure in deep learning. GAN-based data augmentation can be utilized in many domains. For instance, in the credit card fraud domain, the imbalanced dataset problem is a major one as the number of credit card fraud cases is [...] Read more.
Data augmentation is an important procedure in deep learning. GAN-based data augmentation can be utilized in many domains. For instance, in the credit card fraud domain, the imbalanced dataset problem is a major one as the number of credit card fraud cases is in the minority compared to legal payments. On the other hand, generative techniques are considered effective ways to rebalance the imbalanced class issue, as these techniques balance both minority and majority classes before the training. In a more recent period, Generative Adversarial Networks (GANs) are considered one of the most popular data generative techniques as they are used in big data settings. This research aims to present a survey on data augmentation using various GAN variants in the credit card fraud detection domain. In this survey, we offer a comprehensive summary of several peer-reviewed research papers on GAN synthetic generation techniques for fraud detection in the financial sector. In addition, this survey includes various solutions proposed by different researchers to balance imbalanced classes. In the end, this work concludes by pointing out the limitations of the most recent research articles and future research issues, and proposes solutions to address these problems. Full article
(This article belongs to the Special Issue Privacy and Security in Machine Learning)
Show Figures

Figure 1

Back to TopTop