Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine Learning Algorithms = Adversarial Robustness in Signal Processing /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Machine Learning Algorithms/ by Fuwei Li, Lifeng Lai, Shuguang Cui.
Reminder of title:
Adversarial Robustness in Signal Processing /
Author:
Li, Fuwei.
other author:
Lai, Lifeng.
Description:
IX, 104 p. 23 illus., 22 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Machine learning. -
Online resource:
https://doi.org/10.1007/978-3-031-16375-3
ISBN:
9783031163753
Machine Learning Algorithms = Adversarial Robustness in Signal Processing /
Li, Fuwei.
Machine Learning Algorithms
Adversarial Robustness in Signal Processing /[electronic resource] :by Fuwei Li, Lifeng Lai, Shuguang Cui. - 1st ed. 2022. - IX, 104 p. 23 illus., 22 illus. in color.online resource. - Wireless Networks,2366-1445. - Wireless Networks,.
Chapter. 1. Introduction -- Chapter. 2. Optimal Feature Manipulation Attacks Against Linear Regression -- Chapter. 3. On the Adversarial Robustness of LASSO Based Feature Selection -- Chapter. 4. On the Adversarial Robustness of Subspace Learning -- Chapter. 5. Summary and Extensions -- Chapter. 6. Appendix.
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks. The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm. This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.
ISBN: 9783031163753
Standard No.: 10.1007/978-3-031-16375-3doiSubjects--Topical Terms:
561253
Machine learning.
LC Class. No.: Q325.5-.7
Dewey Class. No.: 006.31
Machine Learning Algorithms = Adversarial Robustness in Signal Processing /
LDR
:03843nam a22004095i 4500
001
1085467
003
DE-He213
005
20221114090033.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031163753
$9
978-3-031-16375-3
024
7
$a
10.1007/978-3-031-16375-3
$2
doi
035
$a
978-3-031-16375-3
050
4
$a
Q325.5-.7
072
7
$a
UYQM
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQM
$2
thema
082
0 4
$a
006.31
$2
23
100
1
$a
Li, Fuwei.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1391942
245
1 0
$a
Machine Learning Algorithms
$h
[electronic resource] :
$b
Adversarial Robustness in Signal Processing /
$c
by Fuwei Li, Lifeng Lai, Shuguang Cui.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
IX, 104 p. 23 illus., 22 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Wireless Networks,
$x
2366-1445
505
0
$a
Chapter. 1. Introduction -- Chapter. 2. Optimal Feature Manipulation Attacks Against Linear Regression -- Chapter. 3. On the Adversarial Robustness of LASSO Based Feature Selection -- Chapter. 4. On the Adversarial Robustness of Subspace Learning -- Chapter. 5. Summary and Extensions -- Chapter. 6. Appendix.
520
$a
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks. The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm. This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.
650
0
$a
Machine learning.
$3
561253
650
0
$a
Wireless communication systems.
$3
562740
650
0
$a
Mobile communication systems.
$3
562917
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Machine Learning.
$3
1137723
650
2 4
$a
Wireless and Mobile Communication.
$3
1207058
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Lai, Lifeng.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1391943
700
1
$a
Cui, Shuguang.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1280535
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031163746
776
0 8
$i
Printed edition:
$z
9783031163760
776
0 8
$i
Printed edition:
$z
9783031163777
830
0
$a
Wireless Networks,
$x
2366-1186
$3
1258208
856
4 0
$u
https://doi.org/10.1007/978-3-031-16375-3
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login