Skip to main content

Learning with Malicious Noise

  • Living reference work entry
  • First Online:
Encyclopedia of Algorithms
  • 575 Accesses

Years and Authors of Summarized Original Work

1993; Kearns, Li

1999; Cesa-Bianchi, Dichterman, Fischer, Shamir, Simon

Problem Definition

This problem is concerned with PAC learning of concept classes when training examples are affected by malicious errors. The PAC (probably approximately correct) model of learning (also known as the distribution-free model of learning) was introduced by Valiant [13]. This model makes the idealized assumption that error-free training examples are generated from the same distribution which is then used to evaluate the learned hypothesis. In many environments, however, there is some chance that an erroneous example is given to the learning algorithm. The malicious noise model – again introduced by Valiant [14] – extends the PAC model by allowing example errors of any kind: it makes no assumptions on the nature of the errors that occur. In this sense the malicious noise model is a worst-case model of errors, in which errors may be generated by an...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Recommended Reading

  1. Aslam JA, Decatur SE (1998) Specification and simulation of statistical query algorithms for efficiency and noise tolerance. J Comput Syst Sci 56:191–208

    Article  MATH  MathSciNet  Google Scholar 

  2. Auer P, Cesa-Bianchi N (1998) On-line learning with malicious noise and the closure algorithm. Ann Math Artif Intell 23:83–99

    Article  MATH  MathSciNet  Google Scholar 

  3. Ben-David S, Eiron N, Long P (2003) On the difficulty of approximately maximizing agreements. J Comput Syst Sci 66:496–514

    Article  MATH  MathSciNet  Google Scholar 

  4. Blumer A, Ehrenfeucht A, Haussler D, Warmuth M (1989) Learnability and the Vapnik-Chervonenkis dimension. J ACM 36:929–965

    Article  MATH  MathSciNet  Google Scholar 

  5. Brubaker SC (2009) Robust PCA and clustering in noisy mixtures. In: Proceedings of 20th annual ACM-SIAM symposium on discrete algorithms, New York, pp 1078–1087

    Google Scholar 

  6. Bshouty N, Eiron N, Kushilevitz E (2002) PAC learning with nasty noise. Theor Comput Sci 288:255–275

    Article  MATH  MathSciNet  Google Scholar 

  7. Cesa-Bianchi N, Dichterman E, Fischer P, Shamir E, Simon HU (1999) Sample-efficient strategies for learning in the presence of noise. J ACM 46:684–719

    Article  MATH  MathSciNet  Google Scholar 

  8. Kearns M, Li M (1988) Learning in the presence of malicious errors. In: Proceedings of 20th ACM symposium on theory of computing, Chicago, pp 267–280

    Google Scholar 

  9. Kearns M, Li M (1993) Learning in the presence of malicious errors. SIAM J Comput 22:807–837

    Article  MATH  MathSciNet  Google Scholar 

  10. Kearns M, Schapire R, Sellie L (1994) Toward efficient agnostic learning. Mach Learn 17:115–141

    MATH  Google Scholar 

  11. Klivans AR, Long PM, Servedio RA (2009) Learning halfspaces with malicious noise. Journal of Mach Learn Res 10:2715–2740

    MATH  MathSciNet  Google Scholar 

  12. Servedio RA (2003) Smooth boosting and learning with malicious noise. Journal of Mach Learn Res 4:633–648

    MathSciNet  Google Scholar 

  13. Valiant L (1984) A theory of the learnable. Commun ACM 27:1134–1142

    Article  MATH  Google Scholar 

  14. Valiant L Learning (1985) disjunctions of conjunctions. In: Proceedings of 9th international joint conference on artificial intelligence, Los Angeles, pp 560–566

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Auer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Auer, P. (2015). Learning with Malicious Noise. In: Kao, MY. (eds) Encyclopedia of Algorithms. Springer, Boston, MA. https://doi.org/10.1007/978-3-642-27848-8_198-2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27848-8_198-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Online ISBN: 978-3-642-27848-8

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics