Cyber security meets machine learning / Xiaofeng Chen, Willy Susilo, Elisa Bertino, editors.
2021
Q325.5
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Cyber security meets machine learning / Xiaofeng Chen, Willy Susilo, Elisa Bertino, editors.
ISBN
9789813367265 (electronic bk.)
9813367261 (electronic bk.)
9813367253
9789813367258
9813367261 (electronic bk.)
9813367253
9789813367258
Imprint
Singapore : Springer, 2021.
Language
English
Description
1 online resource
Other Standard Identifiers
10.1007/978-981-33-6726-5 doi
Call Number
Q325.5
Dewey Decimal Classification
006.3/1
Summary
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed July 14, 2021).
Available in Other Form
Print version: 9789813367258
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Chapter 1. IoT Attacks and Malware
Chapter 2. Machine Learning-based Online Source Identification for Image Forensics
Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles
Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning
Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems
Chapter 6. Secure Outsourced Machine Learning
Chapter 7. A Survey on Secure Outsourced Deep Learning.
Chapter 2. Machine Learning-based Online Source Identification for Image Forensics
Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles
Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning
Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems
Chapter 6. Secure Outsourced Machine Learning
Chapter 7. A Survey on Secure Outsourced Deep Learning.