Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Backdoor Attacks against Learning-Based Algorithms

Best Price (Coupon Required):
Buy Backdoor Attacks against Learning-Based Algorithms for $116.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $129.00 - $129.00
BEST PRICE

Single Product Purchase

$116.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$129.00 $129.00

10% OFF
This deals requires coupon
$116.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031573880
Condition
New
Product Description

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Computer and Information Science

Computer and Information Science

$109.99
Models of Depressive Disorders

Models of Depressive Disorders

$54.99
Information and Knowledge Management in Complex Systems

Information and Knowledge Management in Complex Systems

$54.99
Grid and Services Evolution

Grid and Services Evolution

$109.99
The Intersection of Trauma and Disaster Behavioral Health

The Intersection of Trauma and Disaster Behavioral Health

$109.99
Produktionsplanung und -steuerung im Hannoveraner Lieferkettenmodell

Produktionsplanung und -steuerung im Hannoveraner Lieferkettenmodell

$59.99
Algebraic Topology - Rational Homotopy

Algebraic Topology - Rational Homotopy

$54.99
Coronary Artery Surgery

Coronary Artery Surgery

$109.99
The Stability Theory of Stream Ciphers

The Stability Theory of Stream Ciphers

$39.99
Marketing Literature

Marketing Literature

$59.99
Clinical Embryology

Clinical Embryology

$249.99
Fibrinklebung in der Allgemein- und Unfallchirurgie, Orthopdie, Kinder- und Thoraxchirurgie

Fibrinklebung in der Allgemein- und Unfallchirurgie, Orthopdie, Kinder- und Thoraxchirurgie

$69.99
Over-Constrained Systems

Over-Constrained Systems

$39.99
Erfolgreiches Investitionsgtermarketing

Erfolgreiches Investitionsgtermarketing

$39.99
Sleeping Beauties in Theoretical Physics

Sleeping Beauties in Theoretical Physics

$49.99
Engineering and Sustainable Community Development

Engineering and Sustainable Community Development

$34.99
Protophysics of Time

Protophysics of Time

$169.99
Power Quality

Power Quality

$169.99
Kompensation von Zinsnderungs- und Whrungsrisiken in der Bankbilanz

Kompensation von Zinsnderungs- und Whrungsrisiken in der Bankbilanz

$49.99
Common & Proper Nouns Grade 1 Differentiation Pack

Common & Proper Nouns Grade 1 Differentiation Pack

$5.99
Fundamentals of Continuum Mechanics of Soils

Fundamentals of Continuum Mechanics of Soils

$84.99
Zahnrztliche Chirurgie

Zahnrztliche Chirurgie

$79.99
Lightweight Cryptography for Security and Privacy

Lightweight Cryptography for Security and Privacy

$39.99
Lamsche - Mathieusche - und Verwandte Funktionen in Physik und Technik

Lamsche - Mathieusche - und Verwandte Funktionen in Physik und Technik

$64.99
Inorganic Adduct Molecules of Oxo-Compounds

Inorganic Adduct Molecules of Oxo-Compounds

$54.99
Artificial Intelligence and International Law

Artificial Intelligence and International Law

$159.99
Combinatorial Algebra: Syntax and Semantics

Combinatorial Algebra: Syntax and Semantics

$54.99
Peptide Characterization and Application Protocols

Peptide Characterization and Application Protocols

$109.99
Beginner's Guide to Unity Shader Graph

Beginner's Guide to Unity Shader Graph

$59.99
The Intent of Business

The Intent of Business

$109.99
Fine-Needle Biopsy of Superficial and Deep Masses

Fine-Needle Biopsy of Superficial and Deep Masses

$84.99
The Diabetic Pancreas

The Diabetic Pancreas

$39.99
Akute Nierenschdigung

Akute Nierenschdigung

$74.99
Logic and Algorithms in Computational Linguistics 2021 (LACompLing2021)

Logic and Algorithms in Computational Linguistics 2021 (LACompLing2021)

$179.99
Data-driven Methods for Fault Detection and Diagnosis in Chemical Processes

Data-driven Methods for Fault Detection and Diagnosis in Chemical Processes

$84.99
Fundamentals of Software Engineering

Fundamentals of Software Engineering

$39.99
Globalization, Hegemony and the Future of the City of London

Globalization, Hegemony and the Future of the City of London

$109.99
Bee Products

Bee Products

$249.99
Biofilm Infections

Biofilm Infections

$129.00
Vernon Lee

Vernon Lee

$54.99
previous
next