Muutke küpsiste eelistusi

E-raamat: Attacks, Defenses and Testing for Deep Learning

  • Formaat: PDF+DRM
  • Ilmumisaeg: 03-Jun-2024
  • Kirjastus: Springer Nature
  • Keel: eng
  • ISBN-13: 9789819704255
  • Formaat - PDF+DRM
  • Hind: 246,99 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 03-Jun-2024
  • Kirjastus: Springer Nature
  • Keel: eng
  • ISBN-13: 9789819704255

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness.





Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, wherethe attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model.





An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method. The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks. The network add-on method prevents the adversarial examples by training the adversarial example detector.





Testing deep neural networks is an effective method to measure the security and robustness of deep learning models. Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved.





Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning.
Perturbation Optimized Black-Box Adversarial Attacks via Genetic
Algorithm.-  Feature Transfer Based Stealthy Poisoning Attack for DNNs.-
Adversarial Attacks on GNN Based Vertical Federated Learning.- A Novel DNN
Object Contour Attack on Image Recognition.-  Query-Efficient Adversarial
Attack Against Vertical Federated Graph Learning.- Targeted Label Adversarial
Attack on Graph Embedding.- Backdoor Attack on Dynamic Link Prediction.-
Attention Mechanism based Adversarial Attack against DRL.- Characterizing
Adversarial Examples via Local Gradient Checking.- A Novel Adversarial
Defense by Refocusing on Critical Areas.-  Neuron-level Inverse Perturbation
Against Adversarial Attacks.-  Adaptive Channel Transformation-based Detector
for Adversarial Attacks.-  Defense Against Free-rider Attack From the Weight
Evolving Frequency.-  An Effective Model Copyright Protection for Federated
Learning.-  Guard the vertical federated graph learning from Property
Inference Attack.- Using Adversarial Examples to Against Backdoor Attack in
FL.- Evaluating the Adversarial Robustness of Deep Model by Decision
Boundaries.-  Certifiable Prioritization for Deep Neural Networks via
Movement Cost in Feature Space.- Interpretable White-Box Fairness Testing
through Biased Neuron Identification.-  A Deep Learning Framework for Dynamic
Network Link Prediction.  
Jinyin Chen received BS and Ph.D. degrees from Zhejiang University of Technology, Hangzhou, China, in 2004 and 2009, respectively. She is currently a professor and doctoral supervisor at the Institute of Cyberspace Security, Zhejiang University of Technology. Her works of the past five years are aimed at serving the security needs of intelligent applications such as national defense and public security. She has published more than 60 papers in ICSEUSENIXACLECCVIJCAIIEEE TDSCIEEE TKDEIEEE TSMCIEEE TCASIEEE TNSEIEEE TCSSIEEE TCCNInformation SciencesComputers and Security. More than 20 papers have been published in domestic first-level Chinese journals such as the Journal of Automation, Journal of Software, Journal of Electronics, Journal of Communication, Journal of Information Security, and Computer Research and Development. More than 200 related patents have been applied and more than 90 related invention patents have been authorized. Several platforms/tools have been developed, such as network intelligent model security intelligent immune prototype system, intelligent system data and algorithm security detection platform, intelligent system security analysis and testing and reinforcement platform. Close cooperation has been established with the Academy of Military Sciences, the Third Research Institute of Public Security, the National Network Information Office, and Huawei Singapore Research Institute. Some systems have been deployed and applied on relevant practical platforms.