𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Adversarial Machine Learning

✍ Scribed by Yevgeniy Vorobeychik, Murat Kantarcioglu


Publisher
Morgan & Claypool
Year
2018
Tongue
English
Leaves
169
Series
Synthesis Lectures on Artificial Intelligence and Machine Learning
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicius objects they develop.

The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning. We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research.

Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.


πŸ“œ SIMILAR VOLUMES


Adversarial Machine Learning
✍ Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar πŸ“‚ Library πŸ“… 2019 πŸ› Cambridge University Press 🌐 English

Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, le

Adversarial Machine Learning
✍ Yevgeniy Vorobeychik, Murat Kantarcioglu πŸ“‚ Library πŸ“… 2018 πŸ› Springer 🌐 English

<p><span>The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has bee

Adversarial Robustness for Machine Learn
✍ Pin-Yu Chen, Cho-Jui Hsieh πŸ“‚ Library πŸ“… 2022 πŸ› Academic Press 🌐 English

<span>Adversarial Robustness for Machine Learning summarizes the recent progress on this topic and introduces popular algorithms on adversarial attack, defense and verification. Sections cover adversarial attack, verification and defense, mainly focusing on image classification applications which ar

Machine Learning Algorithms: Adversarial
✍ Fuwei Li, Lifeng Lai, Shuguang Cui πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This book demonstratesΒ the optimal adversarial attacks against several important signal processing algorithms.Β Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal proc