Inicio > > Ciencias de la computación > Inteligencia artificial > Attacks, Defenses and Testing for Deep Learning
Attacks, Defenses and Testing for Deep Learning

Attacks, Defenses and Testing for Deep Learning

Haibin Zheng / Jinyin Chen / Ximin Zhang

307,49 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2024
Materia
Inteligencia artificial
ISBN:
9789819704248
307,49 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, wherethe attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model. An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method. The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks. The network add-on method prevents the adversarial examples by training the adversarial example detector.Testing deep neural networks is an effective method to measure the security and robustness of deep learning models. Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved. Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning.

Artículos relacionados

  • Mastering IoT For Industrial Environments
    Shrey Sharma
    Powering Industrial Growth with IoT Innovations.Book DescriptionEmbark on a journey through the transformative landscape of IoT with this comprehensive guide, 'Mastering IoT For Industrial Environments'.From its inception in the Industrial Revolution to its pivotal role in Industry 4.0, each chapter provides a deep dive into essential concepts. It will explore IoT architecture,...
    Disponible

    46,96 €

  • The Machine Learning Solutions Architect Handbook - Second Edition
    David Ping
    Design, build, and secure scalable machine learning (ML) systems to solve real-world business problems with Python and AWSPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGo in-depth into the ML lifecycle, from ideation and data management to deployment and scalingApply risk management techniques in the ML lifecycle and design architectural patterns for...
    Disponible

    65,50 €

  • The FPGA Programming Handbook - Second Edition
    Frank Bruno / Guy Eschemann
    Develop solid FPGA programming skills in SystemVerilog and VHDL by crafting practical projects - VGA controller, microprocessor, calculator, keyboard - and amplify your know-how with insider industry knowledge, all in one handbook.Purchase of the print or Kindle book includes a free eBook in PDF formatKey Features:- Explore a wide range of FPGA applications, grasp their versati...
    Disponible

    71,47 €

  • Exploring Computer Hardware - 2024 Edition
    Kevin Wilson
    Unlock the mysteries of modern computing with Exploring Computer Hardware. This full color illustrated guide delves into the intricate world of computer components, peripherals, networks and the internet, offering a clear understanding for both beginners, students and tech enthusiasts.Key Features:Full-Color Illustrations and Photographs bring each component and concept to life...
    Disponible

    23,82 €

  • Internet of Things Programming Projects - Second Edition
    Colin Dow
    Unleash the potential of IoT by creating weather indicators, information displays, alarm systems, and a vision recognition-enabled robot carKey Features:- Get to grips with the Raspberry Pi ecosystem and its role in IoT development- Integrate cutting-edge technologies such as MQTT, LoRa, and ROS for advanced IoT applications- Achieve superior control in your robot car with visi...
    Disponible

    86,29 €

  • أساسيات الإدارة الإستراتجية
    رشيد بلعريف
    تكمن أهمية هذا الكتاب في كون موضوع الإدارة الإستراتيجية و الجودة الشاملة عملية مستمرة , فالموارد البشرية تستمد قيمتها مما تملكه من معارف ومهارات وقدرات وهذه الأخيرة تتغير باستمرار وفقا لاحتياجات العمل و احتياجات الفرد نفسه و لذا فان موضوع الإدارة الإستراتيجية ومدى فعاليتها في تحقيق الجودة الشاملة يحقق التطوير المستمر لإدارة الموارد البشرية . كما انه من المواضيع المهمة في وقتنا ...
    Disponible

    32,88 €