語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Security Meets Machine Learning
~
SpringerLink (Online service)
Cyber Security Meets Machine Learning
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber Security Meets Machine Learning/ edited by Xiaofeng Chen, Willy Susilo, Elisa Bertino.
其他題名:
ss
其他作者:
Bertino, Elisa.
面頁冊數:
IX, 163 p. 41 illus., 24 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Applications. -
電子資源:
https://doi.org/10.1007/978-981-33-6726-5
ISBN:
9789813367265
Cyber Security Meets Machine Learning
Cyber Security Meets Machine Learning
[electronic resource] /ssedited by Xiaofeng Chen, Willy Susilo, Elisa Bertino. - 1st ed. 2021. - IX, 163 p. 41 illus., 24 illus. in color.online resource.
Chapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
ISBN: 9789813367265
Standard No.: 10.1007/978-981-33-6726-5doiSubjects--Topical Terms:
669785
Computer Applications.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber Security Meets Machine Learning
LDR
:03191nam a22004215i 4500
001
1046893
003
DE-He213
005
20210707072234.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789813367265
$9
978-981-33-6726-5
024
7
$a
10.1007/978-981-33-6726-5
$2
doi
035
$a
978-981-33-6726-5
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Cyber Security Meets Machine Learning
$h
[electronic resource] /
$c
edited by Xiaofeng Chen, Willy Susilo, Elisa Bertino.
246
3
$a
ss
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
IX, 163 p. 41 illus., 24 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning.
520
$a
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
650
2 4
$a
Computer Applications.
$3
669785
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
671334
650
2 4
$a
Machine Learning.
$3
1137723
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Application software.
$3
528147
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computers.
$3
565115
650
0
$a
Optical data processing.
$3
639187
650
0
$a
Machine learning.
$3
561253
650
0
$a
Computer security.
$3
557122
700
1
$a
Bertino, Elisa.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
675398
700
1
$a
Susilo, Willy.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
679412
700
1
$a
Chen, Xiaofeng.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
815875
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789813367258
776
0 8
$i
Printed edition:
$z
9789813367272
776
0 8
$i
Printed edition:
$z
9789813367289
856
4 0
$u
https://doi.org/10.1007/978-981-33-6726-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入