01961nam 2200445 450 991080696070332120230803014738.01-932010-51-3(MiAaPQ)EBC6903878(Au-PeEL)EBL6903878(CKB)21348207400041(EXLCZ)992134820740004120220929d2013 uy pengurcnu||||||||txtrdacontentcrdamediacrrdacarrierAlive at the center contemporary poems from the Pacific Northwest /edited by Bonnie Nish [and eight others]1st ed.Portland, Oregon :Ooligan Press,[2013]©20131 online resource (252 pages)Pacific Poetry Project (Series)Selected poems from authors in Portland, OR, Seattle, WA, and Vancouver, B.C.Print version: Denning, Susan Alive at the Center La Vergne : Ooligan Press,c2013 9781932010497 The Pacific Poetry Project's first volume, Alive at the Center, aims to capture the thriving poetic atmosphere of the Pacific Northwest. It concentrates on the three major cities that define it-Portland, Seattle, and Vancouver B.C. This anthology, compiled and edited by an outstanding poet from each city, is a cultural conversation among the unique urban communities whose perspectives share more than just a common landscape. Alive at the Center features distinctive, contemporary poets who speak to the individual spirits of these Pacific Northwest cities.Pacific Poetry Project (Series)American poetryNorthwest, PacificAmerican poetry.811.008Nish Bonnie L.MiAaPQMiAaPQMiAaPQBOOK9910806960703321Alive at the center3945891UNINA05777nam 22006255 450 991106184930332120260122120405.03-031-99447-710.1007/978-3-031-99447-0(CKB)45004206600041(MiAaPQ)EBC32510905(Au-PeEL)EBL32510905(DE-He213)978-3-031-99447-0(EXLCZ)994500420660004120260122d2026 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAdversarial Example Detection and Mitigation Using Machine Learning /edited by Ehsan Nowroozi, Rahim Taheri, Lucas Cordeiro1st ed. 2026.Cham :Springer Nature Switzerland :Imprint: Springer,2026.1 online resource (405 pages)Computer Science Series3-031-99446-9 Preface -- Part I Foundations of Adversarial Machine Learning -- Chapter 1 A Brief Survey of Emerging Threats to AI Security -- Chapter 2 Ethical Considerations and Regulatory Standards for Adversarial Defense -- Chapter 3 Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview -- Part II Attacks on AI Systems -- Chapter 4 Backdoor Attacks in Text Classification: Threats, Methods, and Emerging Challenges -- Chapter 5 Biometric Template-Based Reconstruction Attack in Machine Learning -- Chapter 6 Security Weaknesses of Code Generated by Generative AI -- Chapter 7 No More Paper Tigers: A Taxonomy of Realistic Adversarial Attacks on Machine Learning based Malware Detection -- Chapter 8 Adversarial Threats to Digital Twin Technology: A Taxonomy of Vulnerabilities and Attack Surfaces -- Chapter 9 Quantum Adversarial Artificial Intelligence in Secure Internet of Things Networks -- Part III Defense Techniques and Robustness Strategies -- Chapter 10 Detecting and Mitigating Adversarial Examples in Neural Networks: An Enhanced PGD Approach -- Chapter 11 The Role of Explainable AI (XAI) in Enhancing the Security of Machine Learning Systems Against Adversarial Attacks -- Chapter 12 Neurodevelopmental-Inspired Training Enhances Adversarial Robustness of a Primary Visual Cortex-Based Model -- Chapter 13 Evaluating and Defending Against Adversarial Attacks on LLM-Generated LSTM Models -- Chapter 14 Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis -- Chapter 15 Probabilistic Robustness in Deep Learning: A Concise yet Comprehensive Guide -- Part IV Federated Learning under Attack and Defense -- Chapter 16 Enhancing Federated Learning Security: Cluster-Based Strategies to Counter GAN-Poisoned Attacks -- Chapter 17 Defense Strategies in Federated Learning Against Adversarial Attacks -- Chapter 18 Dual Perspectives on GAN-Based Data Poisoning in Federated Learning: VagueGAN Attacks and Data Poisoning Detection -- Part V Applications and Case Studies -- Chapter 19 Cyber Risk Assessment in IT/OT Convergence using Machine Learning -- Chapter 20 Anomaly Detection Techniques in IoT Networks: Review and Comparative Analysis -- Chapter 21 Bridging the Gap from Research to Reality: Methods for Fortifying Mitigation Measures against Adversarial AI -- Index.This book offers a comprehensive exploration of the emerging threats and defense strategies in adversarial machine learning and AI security. It covers a broad range of topics, from federated learning attacks, adversarial defenses, biometric vulnerabilities, and security weaknesses in generative AI to quantum threats and ethical considerations. It also brings together leading researchers to provide an in-depth and multifaceted perspective. As artificial intelligence systems become increasingly integrated into critical sectors such as healthcare, finance, transportation, and national security, understanding and mitigating adversarial risks has never been more crucial. Each chapter delivers not only a detailed analysis of current challenges, but it also includes insights into practical mitigation techniques, future trends, and real-world applications. This book is intended for researchers and graduate students working in machine learning, cybersecurity, and related disciplines. Security professionals will also find this book to be a valuable reference for understanding the latest advancements, defending against sophisticated adversarial threats, and contributing to the development of more robust, trustworthy AI systems. By bridging theoretical foundations with practical applications, this book serves as both a scholarly reference and a catalyst for innovation in the rapidly evolving field of AI security.Computer Science SeriesArtificial intelligenceMachine learningData protectionLaw and legislationCooperating objects (Computer systems)Artificial IntelligenceMachine LearningPrivacyCyber-Physical SystemsArtificial intelligence.Machine learning.Data protectionLaw and legislation.Cooperating objects (Computer systems)Artificial Intelligence.Machine Learning.Privacy.Cyber-Physical Systems.006.31Nowroozi Ehsan1893119Nowroozi1893120MiAaPQMiAaPQMiAaPQBOOK9911061849303321Adversarial Example Detection and Mitigation Using Machine Learning4540600UNINA