語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security meets machine learning
~
Chen, Xiaofeng.
FindBook
Google Book
Amazon
博客來
Cyber security meets machine learning
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber security meets machine learning/ edited by Xiaofeng Chen, Willy Susilo, Elisa Bertino.
其他作者:
Chen, Xiaofeng.
出版者:
Singapore :Springer Singapore : : 2021.,
面頁冊數:
ix, 163 p. :ill., digital ;24 cm.
內容註:
Chapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning.
Contained By:
Springer Nature eBook
標題:
Machine learning - Security measures. -
電子資源:
https://doi.org/10.1007/978-981-33-6726-5
ISBN:
9789813367265
Cyber security meets machine learning
Cyber security meets machine learning
[electronic resource] /edited by Xiaofeng Chen, Willy Susilo, Elisa Bertino. - Singapore :Springer Singapore :2021. - ix, 163 p. :ill., digital ;24 cm.
Chapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
ISBN: 9789813367265
Standard No.: 10.1007/978-981-33-6726-5doiSubjects--Topical Terms:
3500846
Machine learning
--Security measures.
LC Class. No.: Q325.5
Dewey Class. No.: 006.31
Cyber security meets machine learning
LDR
:02804nmm a2200337 a 4500
001
2244339
003
DE-He213
005
20210707072234.0
006
m d
007
cr nn 008maaau
008
211207s2021 si s 0 eng d
020
$a
9789813367265
$q
(electronic bk.)
020
$a
9789813367258
$q
(paper)
024
7
$a
10.1007/978-981-33-6726-5
$2
doi
035
$a
978-981-33-6726-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q325.5
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
006.31
$2
23
090
$a
Q325.5
$b
.C994 2021
245
0 0
$a
Cyber security meets machine learning
$h
[electronic resource] /
$c
edited by Xiaofeng Chen, Willy Susilo, Elisa Bertino.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
ix, 163 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning.
520
$a
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
650
0
$a
Machine learning
$x
Security measures.
$3
3500846
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
890871
650
2 4
$a
Information Systems and Communication Service.
$3
891044
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computer Applications.
$3
891249
700
1
$a
Chen, Xiaofeng.
$3
1279321
700
1
$a
Susilo, Willy.
$3
900132
700
1
$a
Bertino, Elisa.
$3
844538
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-33-6726-5
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9405385
電子資源
11.線上閱覽_V
電子書
EB Q325.5
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入