語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Adversarial machine learning /
~
Kantarcioglu, Murat,
Adversarial machine learning /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
006.31
書名/作者:
Adversarial machine learning // Yevgeniy Vorobeychik, Murat Kantarcioglu.
作者:
Vorobeychik, Yevgeniy,
其他作者:
Kantarcioglu, Murat,
面頁冊數:
1 PDF (xvii, 152 pages) : : illustrations.
附註:
Part of: Synthesis digital library of engineering and computer science.
標題:
Machine learning.
ISBN:
9781681733968
書目註:
Includes bibliographical references (pages 137-148) and index.
內容註:
1. Introduction --
摘要、提要註:
The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicious objects they develop. The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning.We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research. Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.
電子資源:
https://ieeexplore.ieee.org/servlet/opac?bknumber=8436571
Adversarial machine learning /
Vorobeychik, Yevgeniy,
Adversarial machine learning /
Yevgeniy Vorobeychik, Murat Kantarcioglu. - 1 PDF (xvii, 152 pages) :illustrations. - Synthesis lectures on artificial intelligence and machine learning,# 381939-4616 ;. - Synthesis digital library of engineering and computer science..
Part of: Synthesis digital library of engineering and computer science.
Includes bibliographical references (pages 137-148) and index.
1. Introduction --
Abstract freely available; full-text restricted to subscribers or individual document purchasers.
Compendex
The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicious objects they develop. The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning.We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research. Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.
Mode of access: World Wide Web.
ISBN: 9781681733968
Standard No.: 10.2200/S00861ED1V01Y201806AIM039doiSubjects--Topical Terms:
202931
Machine learning.
Subjects--Index Terms:
adversarial machine learning
LC Class. No.: Q325.5 / .V672 2018
Dewey Class. No.: 006.31
Adversarial machine learning /
LDR
:08578nmm 2200625 i 4500
001
509140
003
IEEE
005
20180830113122.0
006
m eo d
007
cr cn |||m|||a
008
210514s2018 caua foab 001 0 eng d
020
$a
9781681733968
$q
ebook
020
$z
9781681733982
$q
epub
020
$z
9781681733975
$q
hardcover
020
$z
9781681733951
$q
paperback
024
7
$a
10.2200/S00861ED1V01Y201806AIM039
$2
doi
035
$a
(CaBNVSL)swl000408653
035
$a
(OCoLC)1050334113
035
$a
8436571
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
Q325.5
$b
.V672 2018
082
0 4
$a
006.31
$2
23
100
1
$a
Vorobeychik, Yevgeniy,
$e
author.
$3
728986
245
1 0
$a
Adversarial machine learning /
$c
Yevgeniy Vorobeychik, Murat Kantarcioglu.
264
1
$a
[San Rafael, California] :
$b
Morgan & Claypool,
$c
2018.
300
$a
1 PDF (xvii, 152 pages) :
$b
illustrations.
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
490
1
$a
Synthesis lectures on artificial intelligence and machine learning,
$x
1939-4616 ;
$v
# 38
500
$a
Part of: Synthesis digital library of engineering and computer science.
504
$a
Includes bibliographical references (pages 137-148) and index.
505
0
$a
1. Introduction --
505
8
$a
2. Machine learning preliminaries -- 2.1 Supervised learning -- 2.1.1 Regression learning -- 2.1.2 Classification learning -- 2.1.3 PAC learnability -- 2.1.4 Supervised learning in adversarial settings -- 2.2 Unsupervised learning -- 2.2.1 Clustering -- 2.2.2 Principal component analysis -- 2.2.3 Matrix completion -- 2.2.4 Unsupervised learning in adversarial settings -- 2.3 Reinforcement learning -- 2.3.1 Reinforcement learning in adversarial settings -- 2.4 Bibliographic notes --
505
8
$a
3. Categories of attacks on machine learning -- 3.1 Attack timing -- 3.2 Information available to the attacker -- 3.3 Attacker goals -- 3.4 Bibliographic notes --
505
8
$a
4. Attacks at decision time -- 4.1 Examples of evasion attacks on machine learning models -- 4.1.1 Attacks on anomaly detection: polymorphic blending -- 4.1.2 Attacks on PDF malware classifiers -- 4.2 Modeling decision-time attacks -- 4.3 White-box decision-time attacks -- 4.3.1 Attacks on binary classifiers: adversarial classifier evasion -- 4.3.2 Decision-time attacks on multiclass classifiers -- 4.3.3 Decision-time attacks on anomaly detectors -- 4.3.4 Decision-time attacks on clustering models -- 4.3.5 Decision-time attacks on regression models -- 4.3.6 Decision-time attacks on reinforcement learning -- 4.4 Black-box decision-time attacks -- 4.4.1 A taxonomy of black-box attacks -- 4.4.2 Modeling attacker information acquisition -- 4.4.3 Attacking using an approximate model -- 4.5 Bibliographical notes --
505
8
$a
5. Defending against decision-time attacks -- 5.1 Hardening supervised learning against decision-time attacks -- 5.2 Optimal evasion-robust classification -- 5.2.1 Optimal evasion-robust sparse SVM -- 5.2.2 Evasion-robust SVM against free-range attacks -- 5.2.3 Evasion-robust SVM against restrained attacks -- 5.2.4 Evasion-robust classification on unrestricted feature spaces -- 5.2.5 Robustness to adversarially missing features -- 5.3 Approximately hardening classifiers against decision-time attacks -- 5.3.1 Relaxation approaches -- 5.3.2 General-purpose defense: iterative retraining -- 5.4 Evasion-robustness through feature-level protection -- 5.5 Decision randomization -- 5.5.1 Model -- 5.5.2 Optimal randomized operational use of classification -- 5.6 Evasion-robust regression -- 5.7 Bibliographic notes --
505
8
$a
6. Data poisoning attacks -- 6.1 Modeling poisoning attacks -- 6.2 Poisoning attacks on binary classification -- 6.2.1 Label-flipping attacks -- 6.2.2 Poison insertion attack on kernel SVM -- 6.3 Poisoning attacks for unsupervised learning -- 6.3.1 Poisoning attacks on clustering -- 6.3.2 Poisoning attacks on anomaly detection -- 6.4 Poisoning attack on matrix completion -- 6.4.1 Attack model -- 6.4.2 Attacking alternating minimization -- 6.4.3 Attacking nuclear norm minimization -- 6.4.4 Mimicking normal user behaviors -- 6.5 A general framework for poisoning attacks -- 6.6 Black-box poisoning attacks -- 6.7 Bibliographic notes --
505
8
$a
7. Defending against data poisoning -- 7.1 Robust learning through data sub-sampling -- 7.2 Robust learning through outlier removal -- 7.3 Robust learning through trimmed optimization -- 7.4 Robust matrix factorization -- 7.4.1 Noise-free subspace recovery -- 7.4.2 Dealing with noise -- 7.4.3 Efficient robust subspace recovery -- 7.5 An efficient algorithm for trimmed optimization problems -- 7.6 Bibliographic notes --
505
8
$a
8. Attacking and defending deep learning -- 8.1 Neural network models -- 8.2 Attacks on deep neural networks: adversarial examples -- 8.2.1 l2-norm attacks -- 8.2.2 l[infinity]-norm attacks -- 8.2.3 l0-norm attacks -- 8.2.4 Attacks in the physical world -- 8.2.5 Black-box attacks -- 8.3 Making deep learning robust to adversarial examples -- 8.3.1 Robust optimization -- 8.3.2 Retraining -- 8.3.3 Distillation -- 8.4 Bibliographic notes --
505
8
$a
9. The road ahead -- 9.1 Beyond robust optimization -- 9.2 Incomplete information -- 9.3 Confidence in predictions -- 9.4 Randomization -- 9.5 Multiple learners -- 9.6 Models and validation --
505
8
$a
Bibliography -- Authors' biographies -- Index.
506
$a
Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510
0
$a
Compendex
510
0
$a
INSPEC
510
0
$a
Google scholar
510
0
$a
Google book search
520
3
$a
The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicious objects they develop. The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning.We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research. Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
538
$a
System requirements: Adobe Acrobat Reader.
588
$a
Title from PDF title page (viewed on August 29, 2018).
650
0
$a
Machine learning.
$3
202931
653
$a
adversarial machine learning
653
$a
game theory
653
$a
machine learning
700
1
$a
Kantarcioglu, Murat,
$e
author.
$3
728987
776
0 8
$i
Print version:
$z
9781681733951
$z
9781681733975
830
0
$a
Synthesis digital library of engineering and computer science.
$3
461208
830
0
$a
Synthesis lectures on artificial intelligence and machine learning ;
$v
29
$3
712848
856
4 2
$3
Abstract with links to resource
$u
https://ieeexplore.ieee.org/servlet/opac?bknumber=8436571
筆 0 讀者評論
多媒體
多媒體檔案
https://ieeexplore.ieee.org/servlet/opac?bknumber=8436571
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入