語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine Learning Algorithms = Adversarial Robustness in Signal Processing /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Machine Learning Algorithms/ by Fuwei Li, Lifeng Lai, Shuguang Cui.
其他題名:
Adversarial Robustness in Signal Processing /
作者:
Li, Fuwei.
其他作者:
Cui, Shuguang.
面頁冊數:
IX, 104 p. 23 illus., 22 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-031-16375-3
ISBN:
9783031163753
Machine Learning Algorithms = Adversarial Robustness in Signal Processing /
Li, Fuwei.
Machine Learning Algorithms
Adversarial Robustness in Signal Processing /[electronic resource] :by Fuwei Li, Lifeng Lai, Shuguang Cui. - 1st ed. 2022. - IX, 104 p. 23 illus., 22 illus. in color.online resource. - Wireless Networks,2366-1445. - Wireless Networks,.
Chapter. 1. Introduction -- Chapter. 2. Optimal Feature Manipulation Attacks Against Linear Regression -- Chapter. 3. On the Adversarial Robustness of LASSO Based Feature Selection -- Chapter. 4. On the Adversarial Robustness of Subspace Learning -- Chapter. 5. Summary and Extensions -- Chapter. 6. Appendix.
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks. The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm. This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.
ISBN: 9783031163753
Standard No.: 10.1007/978-3-031-16375-3doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: Q325.5-.7
Dewey Class. No.: 006.31
Machine Learning Algorithms = Adversarial Robustness in Signal Processing /
LDR
:03843nam a22004095i 4500
001
1085467
003
DE-He213
005
20221114090033.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031163753
$9
978-3-031-16375-3
024
7
$a
10.1007/978-3-031-16375-3
$2
doi
035
$a
978-3-031-16375-3
050
4
$a
Q325.5-.7
072
7
$a
UYQM
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQM
$2
thema
082
0 4
$a
006.31
$2
23
100
1
$a
Li, Fuwei.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1391942
245
1 0
$a
Machine Learning Algorithms
$h
[electronic resource] :
$b
Adversarial Robustness in Signal Processing /
$c
by Fuwei Li, Lifeng Lai, Shuguang Cui.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
IX, 104 p. 23 illus., 22 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Wireless Networks,
$x
2366-1445
505
0
$a
Chapter. 1. Introduction -- Chapter. 2. Optimal Feature Manipulation Attacks Against Linear Regression -- Chapter. 3. On the Adversarial Robustness of LASSO Based Feature Selection -- Chapter. 4. On the Adversarial Robustness of Subspace Learning -- Chapter. 5. Summary and Extensions -- Chapter. 6. Appendix.
520
$a
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks. The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm. This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Wireless and Mobile Communication.
$3
1207058
650
1 4
$a
Machine Learning.
$3
1137723
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Mobile communication systems.
$3
562917
650
0
$a
Wireless communication systems.
$3
562740
650
0
$a
Machine learning.
$3
561253
700
1
$a
Cui, Shuguang.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1280535
700
1
$a
Lai, Lifeng.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1391943
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031163746
776
0 8
$i
Printed edition:
$z
9783031163760
776
0 8
$i
Printed edition:
$z
9783031163777
830
0
$a
Wireless Networks,
$x
2366-1186
$3
1258208
856
4 0
$u
https://doi.org/10.1007/978-3-031-16375-3
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入