ISBN-13: 9783030556914 / Angielski / Twarda / 2021 / 227 str.
ISBN-13: 9783030556914 / Angielski / Twarda / 2021 / 227 str.
Part I: Game-Playing AI and Game Theory-based Techniques for Cyber Defenses
Rethinking Intelligent Behavior as Competitive Games for Handling Adversarial Challenges to Machine Learning
Joseph B Collins and Prithviraj Dasgupta
Security of Distributed Machine Learning:A Game-Theoretic Approach to Design Secure DSVM
Rui Zhang and Quanyan Zhu
Be Careful When Learning Against Adversaries: Imitative Attacker Deception in Stackelberg Security Games
Haifeng Xu and Thanh H. Nguyen
Part II: Data Modalities and Distributed Architectures for Countering Adversarial Cyber Attacks
Adversarial Machine Learning in Text: A Case Study of Phishing Email Detection with RCNN model
Daniel Lee and Rakesh M. Verma
Overview of GANs for Image Synthesis and Detection Methods
Eric Tjon, Melody Moh and Teng-Sheng Moh
Robust Machine Learning using Diversity and Blockchain
Raj Mani Shukla, Shahriar Badsha, Deepak Tosh, and Shamik Sengupta
Part III: Human Machine Interactions and Roles in Automated Cyber Defenses
Automating the Investigation of Sophisticated Cyber Threats with Cognitive Agents
Steven Meckl, Gheorghe Tecuci, Dorin Marcu and Mihai Boicu
Integrating Human Reasoning and Machine Learning to Classify Cyber Attacks
Ying Zhao and Lauren Jones
Homology as an Adversarial Attack Indicator
Ira S. Moskowitz, Nolan Bay, Brian Jalaian and Arnold Tunick
Cyber-(in)security, revisited: Proactive Cyber-defenses, Interdependence and Autonomous Human Machine Teams (A-HMTs)
William Lawless, Ranjeev Mittu, Ira Moskowitz, Donald Sofge and Stephen Russell
This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner.
1997-2024 DolnySlask.com Agencja Internetowa