|
|
|
|
LEADER |
03283nmm a2200421 u 4500 |
001 |
EB001995330 |
003 |
EBX01000000000000001158232 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210803 ||| eng |
020 |
|
|
|a 9789813367265
|
100 |
1 |
|
|a Chen, Xiaofeng
|e [editor]
|
245 |
0 |
0 |
|a Cyber Security Meets Machine Learning
|h Elektronische Ressource
|c edited by Xiaofeng Chen, Willy Susilo, Elisa Bertino
|
250 |
|
|
|a 1st ed. 2021
|
260 |
|
|
|a Singapore
|b Springer Nature Singapore
|c 2021, 2021
|
300 |
|
|
|a IX, 163 p. 41 illus., 24 illus. in color
|b online resource
|
505 |
0 |
|
|a Chapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Machine learning
|
653 |
|
|
|a Image processing / Digital techniques
|
653 |
|
|
|a Machine Learning
|
653 |
|
|
|a Computer vision
|
653 |
|
|
|a Database Management System
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Imaging, Vision, Pattern Recognition and Graphics
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Database management
|
700 |
1 |
|
|a Susilo, Willy
|e [editor]
|
700 |
1 |
|
|a Bertino, Elisa
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
028 |
5 |
0 |
|a 10.1007/978-981-33-6726-5
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-33-6726-5?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations
|