LEADER 04212nam 22007575 450 001 9910488713403321 005 20251113185454.0 010 $a981-336-726-1 024 7 $a10.1007/978-981-33-6726-5 035 $a(CKB)4100000011979650 035 $a(MiAaPQ)EBC6676429 035 $a(Au-PeEL)EBL6676429 035 $a(OCoLC)1259623724 035 $a(PPN)260302511 035 $a(DE-He213)978-981-33-6726-5 035 $a(EXLCZ)994100000011979650 100 $a20210702d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Meets Machine Learning /$fedited by Xiaofeng Chen, Willy Susilo, Elisa Bertino 205 $a1st ed. 2021. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (168 pages) 311 08$a981-336-725-3 327 $aChapter 1. IoT Attacks and Malware -- Chapter 2. Machine Learning-based Online Source Identification for Image Forensics -- Chapter 3. Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- Chapter 4. Visual Analysis of Adversarial Examples in Machine Learning -- Chapter 5. Adversarial Attacks against Deep Learning-based Speech Recognition Systems -- Chapter 6. Secure Outsourced Machine Learning -- Chapter 7. A Survey on Secure Outsourced Deep Learning. 330 $aMachine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations. 606 $aData protection 606 $aMachine learning 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aDatabase management 606 $aComputer networks 606 $aApplication software 606 $aData and Information Security 606 $aMachine Learning 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aDatabase Management System 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aMachine learning. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aDatabase management. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aMachine Learning. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aDatabase Management System. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a006.31 700 $aChen$b Xiaofeng$0850517 702 $aSusilo$b Willy 702 $aBertino$b Elisa 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910488713403321 996 $aCyber security meets machine learning$92814028 997 $aUNINA