Adversarial machine learning : attack surfaces, defence mechanisms, learning theories in artificial intelligence / Aneesh Sreevallabh Chivukula, Xinghao Yang, Bo Liu, Wei Liu, Wanlei Zhou.

A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the late...

Full description

Saved in:
Bibliographic Details
Main Authors: Chivukula, Aneesh Sreevallabh (Author), Yang, Xinghao (Author), Liu, Bo (Author), Liu, Wei (Chemical engineer) (Author), Zhou, Wanlei (Author)
Format: eBook
Language:English
Published: Cham, Switzerland : Springer, [2023]
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a22000007i 4500
001 on1373259870
003 OCoLC
005 20241006213017.0
006 m o d
007 cr cnu---unuuu
008 230317s2023 sz ob 000 0 eng d
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d EBLCP  |d YDX  |d N$T  |d UKAHL  |d OCLCF  |d YDX  |d OCLCO  |d OCLCL 
019 |a 1372015985  |a 1372396305 
020 |a 9783030997724  |q electronic book 
020 |a 3030997723  |q electronic book 
020 |z 9783030997717 
020 |z 3030997715 
024 7 |a 10.1007/978-3-030-99772-4  |2 doi 
035 |a (OCoLC)1373259870  |z (OCoLC)1372015985  |z (OCoLC)1372396305 
050 4 |a QA76.9.A25  |b C55 2023 
072 7 |a UYQ  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
049 |a HCDD 
100 1 |a Chivukula, Aneesh Sreevallabh,  |e author. 
245 1 0 |a Adversarial machine learning :  |b attack surfaces, defence mechanisms, learning theories in artificial intelligence /  |c Aneesh Sreevallabh Chivukula, Xinghao Yang, Bo Liu, Wei Liu, Wanlei Zhou. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2023] 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
505 0 |a Adversarial Machine Learning -- Adversarial Deep Learning -- Security and Privacy in Adversarial Learning -- Game-Theoretical Attacks with Adversarial Deep Learning Models -- Physical Attacks in the Real World -- Adversarial Defense Mechanisms -- Adversarial Learning for Privacy Preservation. 
520 |a A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning. 
588 |a Description based on online resource; title from digital title page (viewed on April 27, 2023). 
650 0 |a Computer security. 
650 0 |a Deep learning (Machine learning) 
650 7 |a Computer security  |2 fast 
650 7 |a Deep learning (Machine learning)  |2 fast 
700 1 |a Yang, Xinghao,  |e author. 
700 1 |a Liu, Bo,  |e author. 
700 1 |a Liu, Wei  |c (Chemical engineer),  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjK4mRDDXkpDYBhXM3fdDC 
700 1 |a Zhou, Wanlei,  |e author.  |1 https://isni.org/isni/0000000117462496 
776 0 8 |i Print version:  |a Chivukula, Aneesh Sreevallabh.  |t Adversarial deep learning in cybersecurity.  |d Cham : Springer, 2022  |z 9783030997717  |w (OCoLC)1338684528 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-030-99772-4  |y Click for online access 
903 |a SPRING-ALL2023 
994 |a 92  |b HCD