AI RESEARCH
Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening
arXiv CS.LG
•
ArXi:2603.25257v1 Announce Type: cross This paper investigates the susceptibility to model integrity attacks that overload virtual machines assigned by the k-means algorithm used for resource provisioning in fog networks. The considered k-means algorithm runs two phases iteratively: offline clustering to form clusters of requested workload and online classification of new incoming requests into offline-created clusters. First, we consider an evasion attack against the classifier in the online phase.