Science, Nature & Maths      Engineering & Technology

Attacks, Defenses and Testing for Deep Learning

(0 reviews)
Condition
Quantity
(296 available)
Share
Book Details
Language
English
Publishers
Springer; 2024th edition (4 Jun. 2024)
Weight
0.76 KG
Publication Date
08/07/2024
ISBN-10
9819704243
Pages
419 pages
ISBN-13
9789819704248
Dimensions
15.6 x 2.39 x 23.39 cm
SKU
9789819704248
Author Name
Jinyin Chen (Author)
Read More

Reviews & Ratings

out of 5.0
(0 reviews)
There have been no reviews for this product yet.
This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios.

However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises.

Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks.

Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, wherethe attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model.

An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method.

The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks.

The network add-on method prevents the adversarial examples by training the adversarial example detector. Testing deep neural networks is an effective method to measure the security and robustness of deep learning models.

Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved.

Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning. .

Frequently Bought Products

Product Queries (0)

Login Or Registerto submit your questions to seller

Other Questions

No none asked to seller yet

Bookiyos Books Solutions - Quality Books, Unbeatable Prices

Bookiyos Books Solutions is your premier online bookstore offering a vast selection of over 5 crore books. Whether you're looking for the latest releases, timeless classics, or rare finds, we have something for every reader. Our platform serves customers worldwide, including the USA, UK, and Europe, with fast delivery and easy return policies to ensure a hassle-free shopping experience. Discover daily updates, exclusive deals, and a comprehensive collection of books that cater to all your reading needs. Shop with confidence at Bookiyos, where quality books and unbeatable prices meet.

Why Choose Bookiyos?

Extensive Inventory: New, old, and rare books available.
Fast Delivery: Same or next-day shipping.
Easy Returns: Hassle-free refund and return policies.
Global Reach: Serving customers in the USA, UK, Europe, and beyond.
Daily Updates: Thousands of new titles added every day.
Join our community of book lovers and start your literary journey with Bookiyos Books Solutions today!