Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Logótipo
Você está em: Start > Publications > View > Studying the robustness of data imputation methodologies against adversarial attacks
Publication

Studying the robustness of data imputation methodologies against adversarial attacks

Title
Studying the robustness of data imputation methodologies against adversarial attacks
Type
Article in International Scientific Journal
Year
2025
Authors
Mangussi, AD
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Pereira, RC
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Lorena, AC
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Santos, MS
(Author)
FCUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page Without ORCID
Abreu, PH
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Title: COMPUTERS & SECURITYImported from Authenticus Search for Journal Publications
Vol. 157
ISSN: 0167-4048
Other information
Authenticus ID: P-019-K5C
Abstract (EN): Cybersecurity attacks, such as poisoning and evasion, can intentionally introduce false or misleading information in different forms into data, potentially leading to catastrophic consequences for critical infrastructures, like water supply or energy power plants. While numerous studies have investigated the impact of these attacks on model-based prediction approaches, they often overlook the impurities present in the data used to train these models. One of those forms is missing data, the absence of values in one or more features. This issue is typically addressed by imputing missing values with plausible estimates, which directly impacts the performance of the classifier. The goal of this work is to promote a Data-centric AI approach by investigating how different types of cybersecurity attacks impact the imputation process. To this end, we conducted experiments using four popular evasion and poisoning attacks strategies across 29 real-world datasets, including the NSL-KDD and Edge-IIoT datasets, which were used as case study. For the adversarial attack strategies, we employed the Fast Gradient Sign Method, Carlini & Wagner, Project Gradient Descent, and Poison Attack against Support Vector Machine algorithm. Also, four state-of-the-art imputation strategies were tested under Missing Not At Random, Missing Completely at Random, and Missing At Random mechanisms using three missing rates (5%, 20%, 40%). We assessed imputation quality using MAE, while data distribution shifts were analyzed with the Kolmogorov-Smirnov and Chi-square tests. Furthermore, we measured classification performance by training an XGBoost classifier on the imputed datasets, using F1-score, Accuracy, and AUC. To deepen our analysis, we also incorporated six complexity metrics to characterize how adversarial attacks and imputation strategies impact dataset complexity. Our findings demonstrate that adversarial attacks significantly impact the imputation process. In terms of imputation assessment in what concerns to quality error, the scenario that enrolees imputation with Project Gradient Descent attack proved to be more robust in comparison to other adversarial methods. Regarding data distribution error, results from the Kolmogorov-Smirnov test indicate that in the context of numerical features, all imputation strategies differ from the baseline (without missing data) however for the categorical context Chi-Squared test proved no difference between imputation and the baseline.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 16
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Triple-Similarity Mechanism for alarm management in the cloud (2018)
Article in International Scientific Journal
Dalmazo, BL; João P. Vilela; Curado, M
Systems and methods for SPIT detection in VoIP: Survey and future directions (2018)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Salah, K
IoT security certifications: Challenges and potential approaches (2022)
Article in International Scientific Journal
Cirne, A; Sousa, PR; Resende, JS; antunes, l
Hardening cryptographic operations through the use of secure enclaves (2021)
Article in International Scientific Journal
Brandao, A; Resende, JS; Martins, R
Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication (2023)
Article in International Scientific Journal
Freitas, T; Soares, J; Manuel E Correia; Martins, R

See all (7)

Recommend this page Top
Copyright 1996-2026 © Faculdade de Psicologia e de Ciências da Educação da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2026-04-23 at 11:43:50 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book