Adversarial Machine Learning

Nonfiction, Science & Nature, Mathematics, Game Theory, Computers, Advanced Computing, Artificial Intelligence, Networking & Communications, Computer Security
Cover of the book Adversarial Machine Learning by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi, Morgan & Claypool Publishers
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi ISBN: 9781681733982
Publisher: Morgan & Claypool Publishers Publication: August 8, 2018
Imprint: Morgan & Claypool Publishers Language: English
Author: Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
ISBN: 9781681733982
Publisher: Morgan & Claypool Publishers
Publication: August 8, 2018
Imprint: Morgan & Claypool Publishers
Language: English

The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicius objects they develop.

The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning. We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research.

Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicius objects they develop.

The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning. We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research.

Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.

More books from Morgan & Claypool Publishers

Cover of the book Searching for Habitable Worlds by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Testing iOS Apps with HadoopUnit by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Web Indicators for Research Evaluation by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Visual Information Retrieval using Java and LIRE by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Exploring physics with computer animation and PhysGL by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Active Learning by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Contextual Design by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Outside the Research Lab, Volume 3 by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Research in the Wild by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Beyond Curie by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Advanced Circuit Simulation using Multisim Workbench by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book How to Understand Quantum Mechanics by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Creating Materials with a Desired Refraction Coefficient by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book The Tai Chi in Star Formation by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
Cover of the book Researching Serendipity in Digital Information Environments by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone, Francesca Rossi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy