Compare Prices | Create Shopping Lists with Price Drop Alerts | Set Coupons, Promo Codes & Sales Alerts | Get Access to Exclusive Deals and Much More... All in One Place | Read all about it here

Backdoor Attacks against Learning-Based Algorithms

Backdoor Attacks against Learning-Based Algorithms

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031573880
Condition
New
Product Description

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Available Colors
Available Sizes
1 Offer Price Range: $129.00 - $129.00
BEST PRICE

Single Product Purchase

$129.00
@ Link.springer.com     BUY Now

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
Contact Store Call Store Contact Support
$129.00 $129.00

$129.00
See Site In stock Visit Store

Similar Products

Both Sides of the Border

$169.00

Philosophy in Literature

$44.99

The English Language in the Digital Age

$54.99

Partnerships and the Sustainable Development Goals

$109.99

Advances in Two-Phase Flow and Heat Transfer Fundamentals and Applications I & II

$549.99

Organ Transplantation 1990

$39.99

Healthcare Operations Management

$54.99

Hayek: A Collaborative Biography

$119.99

The Mimetic Evolution of the Court of Justice of the EU

$129.99

Antitumor Antibiotics

$84.99

Computational Methods for Astrophysical Fluid Flow

$84.99

Der Ausbau der Einrichtung das Versuchsfeldes fr Werkzeugmaschinen an der Technischen Hochschule zu

$54.99

Criteria Air Pollutants and their Impact on Environmental Health

$109.99

Data Mining and Knowledge Discovery for Process Monitoring and Control

$109.99

Nuclear Reprogramming

$84.99

The Story of the Space Shuttle

$37.99

Ein Beitrag zur Klrung der Abnutzung bei rollender Reibung mit Schlupf an Elektrolytkupfer

$59.99

Representing Death in the News

$39.99

Vitalism and Its Legacy in Twentieth Century Life Sciences and Philosophy

$59.99

Korruption in Deutschland

$59.99

Studies of Photoinduced Molecular Dynamics Using a Fast Imaging Sensor

$109.99

Clifford TV - Clifford the Big Red Dog Storybook: The Fire Dog Challenge

$4.49

Untersuchung ber die Wschebewegung in Trommelwasch-maschinen unter besonderer Bercksichtigung der

$54.99

The Ecological Bases for Lake and Reservoir Management

$219.99

Row, Row, Row Your Boat

$4.46

Fundamental Structural Analysis

$84.99

The Riemann Boundary Problem on Riemann Surfaces

$39.99

Adhesion

$169.99

Cache and Interconnect Architectures in Multiprocessors

$109.99

Model Checking Software

$69.99

The Black Campus Movement

$109.99

Beginning 3D Game Assets Development Pipeline

$54.99

The Dynamics of Federalism in Nigeria

$54.99

Magnetic Components

$49.99

Tsunami Science Four Years After the 2004 Indian Ocean Tsunami

$54.99

Introduction to Superstrings and M-Theory

$129.99

Mikrochemische Methoden fr neurobiologische Untersuchungen

$69.99

Forced Migration in Eastern Africa

$39.99

Database and Expert Systems Applications

$39.99

Das Andere Erforschen

$49.99