GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computer security. ; Deep learning (Machine learning). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (316 pages)
    Edition: 1st ed.
    ISBN: 9783030997724
    DDC: 005.8
    Language: English
    Note: Intro -- Preface -- Contents -- Author Biography -- List of Figures -- List of Tables -- 1 Adversarial Machine Learning -- 1.1 Adversarial Learning Frameworks -- 1.1.1 Adversarial Algorithms Comparisons -- 1.2 Adversarial Security Mechanisms -- 1.2.1 Adversarial Examples Taxonomies -- 1.3 Stochastic Game Illustration in Adversarial Deep Learning -- 2 Adversarial Deep Learning -- 2.1 Learning Curve Analysis for Supervised Machine Learning -- 2.2 Adversarial Loss Functions for Discriminative Learning -- 2.3 Adversarial Examples in Deep Networks -- 2.4 Adversarial Examples for Misleading Classifiers -- 2.5 Generative Adversarial Networks -- 2.6 Generative Adversarial Networks for Adversarial Learning -- 2.6.1 Causal Feature Learning and Adversarial Machine Learning -- 2.6.2 Explainable Artificial Intelligence and Adversarial Machine Learning -- 2.6.3 Stackelberg Game Illustration in Adversarial Deep Learning -- 2.7 Transfer Learning for Domain Adaptation -- 2.7.1 Adversarial Examples in Transfer learning -- 2.7.2 Adversarial Examples in Domain Adaptation -- 2.7.3 Adversarial Examples in Cybersecurity Domains -- 3 Adversarial Attack Surfaces -- 3.1 Security and Privacy in Adversarial Learning -- 3.1.1 Linear Classifier Attacks -- 3.2 Feature Weighting Attacks -- 3.3 Poisoning Support Vector Machines -- 3.4 Robust Classifier Ensembles -- 3.5 Robust Clustering Models -- 3.6 Robust Feature Selection Models -- 3.7 Robust Anomaly Detection Models -- 3.8 Robust Task Relationship Models -- 3.9 Robust Regression Models -- 3.10 Adversarial Machine Learning in Cybersecurity -- 3.10.1 Sensitivity Analysis of Adversarial Deep Learning -- 4 Game Theoretical Adversarial Deep Learning -- 4.1 Game Theoretical Learning Models -- 4.1.1 Fundamentals of Game Theory -- 4.1.2 Game Theoretical Data Mining -- 4.1.3 Cost-Sensitive Adversaries. , 4.1.4 Adversarial Training Strategies -- 4.2 Game Theoretical Adversarial Learning -- 4.2.1 Multilevel and Multi-stage Optimization in Game Theoretical Adversarial Learning -- 4.3 Game Theoretical Adversarial Deep Learning -- 4.3.1 Overall Structure of Learning Model in Variational Game -- 4.3.2 The Differences Between Our Method and GANs -- 4.3.3 Comparisons of Game Theoretical Adversarial Deep Learning Models -- 4.3.4 Comparisons Between Single Play Attacks and Multiple Play Attacks on Custom Loss Functions -- 4.3.5 Parallel Machines in Reduced Games -- 4.4 Stochastic Games in Predictive Modeling -- 4.4.1 Computational Learning Theory Frameworks to Analyze Game Theoretical Learning Algorithms -- 4.4.2 Game Theoretical Adversarial Deep Learning Algorithms in Information Warfare Applications -- 4.4.3 Game Theoretical Adversarial Deep Learning Algorithms in Cybersecurity Applications -- 4.5 Robust Game Theory in Adversarial Learning Games -- 4.5.1 Existence and Uniqueness of Game Theoretical Equilibrium Solutions -- 4.5.2 Optimal Control Theory and Robust Game Theory -- 5 Adversarial Defense Mechanisms for Supervised Learning -- 5.1 Securing Classifiers Against Feature Attacks -- 5.2 Adversarial Classification Tasks with Regularizers -- 5.3 Adversarial Reinforcement Learning -- 5.3.1 Game Theoretical Adversarial Reinforcement Learning -- 5.4 Computational Optimization Algorithmics for Game Theoretical Adversarial Learning -- 5.4.1 Game Theoretical Learning -- 5.4.1.1 Randomization Strategies in Game Theoretical Adversarial Learning -- 5.4.1.2 Adversarial Deep Learning in Robust Games -- 5.4.1.3 Robust Optimization in Adversarial Learning -- 5.4.2 Generative Learning -- 5.4.2.1 Deep Generative Models for Game Theoretical Adversarial Learning -- 5.4.2.2 Mathematical Programming in Game Theoretical Adversarial Learning. , 5.4.2.3 Low-Rank Approximations in Game Theoretical Adversarial Learning -- 5.4.2.4 Relative Distribution Methods in Adversarial Deep Learning -- 5.5 Defense Mechanisms in Adversarial Machine Learning -- 5.5.1 Defense Mechanisms in Adversarial Deep Learning -- 5.5.2 Explainable Artificial Intelligence in Adversarial Deep Learning -- 6 Physical World Adversarial Attacks on Images and Texts -- 6.1 Adversarial Attacks on Images -- 6.1.1 Gradient-Based Attack -- 6.1.2 Score-Based Attack -- 6.1.3 Decision-Based Attack -- 6.1.4 Transformation-Based Attack -- 6.2 Adversarial Attacks on Texts -- 6.2.1 Character-Level Attack -- 6.2.2 Sentence-Level Attack -- 6.2.3 Word-Level Attack -- 6.2.4 Multilevel Attack -- 6.3 Spam Filtering -- 6.3.1 Text Spam -- 6.3.2 Image Spam -- 6.3.3 Biometric Spam -- 7 Adversarial Perturbation for Privacy Preservation -- 7.1 Adversarial Perturbation for Privacy Preservation -- 7.1.1 Visual Data Privacy Model -- 7.1.2 Privacy Protection Mechanisms Using Adversarial Perturbations -- 7.1.2.1 File-Level Privacy Protection -- 7.1.2.2 Object-Level Privacy Protection -- 7.1.2.3 Feature-Level Privacy Protection -- 7.1.3 Discussion and Future Works -- Correction to: Adversarial Machine Learning -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...