Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessGeopolitics, AI, and Cybersecurity: Insights From RSAC 2026Dark ReadingAdvanced Compact Patterns for Web3 DevelopersDEV CommunityA conversation on concentration of powerLessWrongDecoding the Black Box: LLM Observability with LangSmith & Helicone for Local ModelsDEV CommunityBest Free Snyk Alternatives for Vulnerability ScanningDEV CommunityFrom language to testing: How AI is reshaping education in South Africa - cnn.comGNews AI educationKey AI, Cybersecurity, and Privacy Takeaways from the NAIC 2026 Spring Meeting - JD SupraGoogle News: AIAI LEGAL KEYNOTE SPEAKER & ARTIFICIAL INTELLIGENCE LAW FUTURIST FOR EVENTS - futuristsspeakers.comGNews AI legalOpenAI Buys Streaming Show ‘TBPN,’ Aiming to Change Narrative on A.I. - The New York TimesGoogle News: AIGateway Capital announces first close of $25M Fund IITechCrunch AIBrazil’s machinery industry drives innovation in automation, AI, IoT and clean energy - The National Law ReviewGNews AI BrazilHow Cos. Can Navigate The Patchwork Of AI Safety Bills - Law360Google News: AI SafetyBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessGeopolitics, AI, and Cybersecurity: Insights From RSAC 2026Dark ReadingAdvanced Compact Patterns for Web3 DevelopersDEV CommunityA conversation on concentration of powerLessWrongDecoding the Black Box: LLM Observability with LangSmith & Helicone for Local ModelsDEV CommunityBest Free Snyk Alternatives for Vulnerability ScanningDEV CommunityFrom language to testing: How AI is reshaping education in South Africa - cnn.comGNews AI educationKey AI, Cybersecurity, and Privacy Takeaways from the NAIC 2026 Spring Meeting - JD SupraGoogle News: AIAI LEGAL KEYNOTE SPEAKER & ARTIFICIAL INTELLIGENCE LAW FUTURIST FOR EVENTS - futuristsspeakers.comGNews AI legalOpenAI Buys Streaming Show ‘TBPN,’ Aiming to Change Narrative on A.I. - The New York TimesGoogle News: AIGateway Capital announces first close of $25M Fund IITechCrunch AIBrazil’s machinery industry drives innovation in automation, AI, IoT and clean energy - The National Law ReviewGNews AI BrazilHow Cos. Can Navigate The Patchwork Of AI Safety Bills - Law360Google News: AI Safety
AI NEWS HUBbyEIGENVECTOREigenvector

Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

arXivMarch 26, 202610 min read0 views
Source Quiz

This paper investigates the susceptibility to model integrity attacks that overload virtual machines assigned by the k-means algorithm used for resource provisioning in fog networks. The considered k-means algorithm runs two phases iteratively: offline clustering to form clusters of requested workload and online classification of new incoming requests into offline-created clusters. First, we consider an evasion attack against the classifier in the online phase. A threat actor launches an exploratory attack using query-based reverse engineering to discover the Machine Learning (ML) model (the c — Younes Salmi, Hanna Bogucka

View PDF HTML (experimental)

Abstract:This paper investigates the susceptibility to model integrity attacks that overload virtual machines assigned by the k-means algorithm used for resource provisioning in fog networks. The considered k-means algorithm runs two phases iteratively: offline clustering to form clusters of requested workload and online classification of new incoming requests into offline-created clusters. First, we consider an evasion attack against the classifier in the online phase. A threat actor launches an exploratory attack using query-based reverse engineering to discover the Machine Learning (ML) model (the clustering scheme). Then, a passive causative (evasion) attack is triggered in the offline phase. To defend the model, we suggest a proactive method using adversarial training to introduce attack robustness into the classifier. Our results show that our mitigation technique effectively maintains the stability of the resource provisioning system against attacks.

Subjects:

Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Cite as: arXiv:2603.25257 [cs.CR]

(or arXiv:2603.25257v1 [cs.CR] for this version)

https://doi.org/10.48550/arXiv.2603.25257

arXiv-issued DOI via DataCite (pending registration)

Related DOI:

https://doi.org/10.1109/EuCNC/6GSummit63408.2025.11036732

DOI(s) linking to related resources

Submission history

From: Hanna Bogucka [view email] [v1] Thu, 26 Mar 2026 10:00:39 UTC (839 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Mitigating …researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 176 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!