LEADER 04955nam 2200481 450 001 9910488713403321 005 20220327091830.0 010 $a981-336-726-1 035 $a(CKB)4100000011979650 035 $a(MiAaPQ)EBC6676429 035 $a(Au-PeEL)EBL6676429 035 $a(OCoLC)1259623724 035 $a(PPN)260302511 035 $a(EXLCZ)994100000011979650 100 $a20220327d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber security meets machine learning /$fXiaofeng Chen, Willy Susilo, Elisa Bertino 210 1$aSingapore :$cSpringer,$d[2021] 210 4$dİ2021 215 $a1 online resource (168 pages) 311 $a981-336-725-3 327 $aIntro -- Preface -- Contents -- IoT Attacks and Malware -- 1 Introduction -- 2 Background -- 2.1 Cybersecurity Kill Chains -- 2.2 Major IoT Security Concerns -- 3 Attack Classification -- 3.1 Passive/Information Stealing Attacks -- 3.2 Service Degradation Attacks -- 3.3 DDoS Attacks -- 4 IoT Malware Analysis and Classification -- 5 AI-Based IDS Solutions -- 6 Conclusion -- References -- Machine Learning-Based Online Source Identification for Image Forensics -- 1 Introduction -- 2 Related Work -- 2.1 Features Engineering for Image Source Identification -- 2.2 Statistical Learning-Based Image Source Identification -- 3 Proposed Scheme: OSIU -- 3.1 Unknown Sample Triage -- 3.2 Unknown Image Discovery -- 3.3 (K+1)-class Classification -- 4 Experiments and Results -- 4.1 Dataset and Experiment Settings -- 4.2 Features -- 4.3 Evaluation Metrics -- 4.4 Performance of Triaging Unknown Samples -- 4.5 Performance of OSIU -- 5 Conclusion -- References -- Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- 1 Introduction -- 2 Communication Security for Unmanned Aerial Vehicles -- 2.1 UAV Communication Model -- 2.2 Attack Model -- 3 Reinforcement Learning Based UAV Communication Security -- 3.1 Reinforcement Learning Based Anti-Jamming Communications -- 3.2 Reinforcement Learning Based UAV Communications Against Smart Attacks -- 4 UAV Secure Communication Game -- 4.1 Game Model -- 4.2 Nash Equilibrium of the Game -- 5 Related Work -- 5.1 General Anti-jamming Policies in UAV-Aided Communication -- 5.2 Reinforcement Learning in Anti-jamming Communication -- 5.3 Game Theory in Anti-jamming Communication -- 6 Conclusion -- References -- Visual Analysis of Adversarial Examples in Machine Learning -- 1 Introduction -- 2 Adversarial Examples -- 3 Generation of Adversarial Examples -- 4 Properties of Adversarial Examples. 327 $a5 Distinguishing Adversarial Examples -- 6 Robustness of Models -- 7 Challenges and Research Directions -- 8 Conclusion -- References -- Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Speech Recognition -- 2.2 Adversarial Examples -- 2.3 Related Work -- 3 Overview -- 3.1 Motivation -- 3.2 Technical Challenges -- 4 White-Box Attack -- 4.1 Threat Model of White-Box Attack -- 4.2 The Detail Decoding Process of Kaldi -- 4.3 Gradient Descent to Craft Audio Clip -- 4.4 Practical Adversarial Attack Against White-Box Model -- 4.5 Experiment Setup of CommanderSong Attack -- 4.6 Evaluation of CommanderSong Attack -- 5 Black-Box Attack -- 5.1 Threat Model of Black-Box Attack -- 5.2 Transferability Based Approach -- 5.3 Local Model Approximation Approach -- 5.4 Alternate Models Based Generation Approach -- 5.5 Experiment Setup of Devil's Whisper Attack -- 5.6 Evaluation of Devil's Whisper Attack -- 6 Defense -- 7 Conclusion -- Appendix -- References -- A Survey on Secure Outsourced Deep Learning -- 1 Introduction -- 2 Deep Learning -- 2.1 Brief Survey on Deep Learning -- 2.2 Architecture of Deep Learning -- 2.3 Main Computation in Deep Learning -- 3 Outsourced Computation -- 3.1 Brief Survey on Outsourced Computation -- 3.2 System Model -- 3.3 Security Requirements -- 4 Outsourced Deep Learning -- 4.1 Brief Review on Outsourced Deep Learning -- 4.2 Privacy Concerns in Outsourced Deep Learning -- 4.3 Privacy-Preserving Techniques for Outsourced Deep Learning -- 4.4 Taxonomy Standard -- 4.5 Privacy-Preserving Training Outsourcing -- 4.6 Privacy-Preserving Inference Outsourcing -- 5 Conclusion and Future Research Perspectives -- References. 330 $ass. 606 $aMachine learning$xTechnique 606 $aMachine learning$xSecurity measures 615 0$aMachine learning$xTechnique. 615 0$aMachine learning$xSecurity measures. 676 $a006.31 700 $aChen$b Xiaofeng$0850517 702 $aSusilo$b Willy 702 $aBertino$b Elisa 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910488713403321 996 $aCyber security meets machine learning$92814028 997 $aUNINA