Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Backdoor Attacks against Learning-Based Algorithms

Best Price (Coupon Required):
Buy Backdoor Attacks against Learning-Based Algorithms for $116.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $129.00 - $129.00
BEST PRICE

Single Product Purchase

$116.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$129.00 $129.00

10% OFF
This deals requires coupon
$116.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031573880
Condition
New
Product Description

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Logic Programming and Automated Reasoning

Logic Programming and Automated Reasoning

$39.99
Computational Mathematics Modeling in Cancer Analysis

Computational Mathematics Modeling in Cancer Analysis

$54.99
Von Game of Thrones bis House of Cards

Von Game of Thrones bis House of Cards

$39.99
Plasmaproteine und Virushepatitis

Plasmaproteine und Virushepatitis

$9.95
Meldewesen fr Finanzinstitute

Meldewesen fr Finanzinstitute

$54.99
Mechanisms of Secondary Brain Damage in Cerebral Ischemia and Trauma

Mechanisms of Secondary Brain Damage in Cerebral Ischemia and Trauma

$39.99
Quattro Pro for Scientific and Engineering Spreadsheets

Quattro Pro for Scientific and Engineering Spreadsheets

$109.99
Transplantation and Changing Management of Organ Failure

Transplantation and Changing Management of Organ Failure

$39.99
Beginning Android C++ Game Development

Beginning Android C++ Game Development

$44.99
Next-Gen Digital Services. A Retrospective and Roadmap for Service Computing of the Future

Next-Gen Digital Services. A Retrospective and Roadmap for Service Computing of the Future

$54.99
Epiphyseal Growth Plate Fractures

Epiphyseal Growth Plate Fractures

$329.99
Statistics in Ornithology

Statistics in Ornithology

$109.99
Neues Denken in der Gesundheitsversorgung Hochbetagter

Neues Denken in der Gesundheitsversorgung Hochbetagter

$79.99
All About Sharks

All About Sharks

$5.21
Be An Expert!: Farm Animals

Be An Expert!: Farm Animals

$4.49
Die Arbeit am Selbst

Die Arbeit am Selbst

$59.99
Relativity Matters

Relativity Matters

$89.99
Geospatial Technology and Smart Cities

Geospatial Technology and Smart Cities

$129.00
Erwachsenenbildung in politischen Umbrchen

Erwachsenenbildung in politischen Umbrchen

$69.99
The Dogaressa of Venice, 1200-1500

The Dogaressa of Venice, 1200-1500

$129.99
Arbeit  Marxistische und systemtheoretische Zugnge

Arbeit Marxistische und systemtheoretische Zugnge

$19.99
Carbosilanes

Carbosilanes

$39.99
Multidimensional Filter Banks and Wavelets

Multidimensional Filter Banks and Wavelets

$109.99
Phenomenological Psychology

Phenomenological Psychology

$169.99
Adult heart muscle cells

Adult heart muscle cells

$39.99
Cardiac Repolarization

Cardiac Repolarization

$219.99
Thought-Evoking Approaches in Engineering Problems

Thought-Evoking Approaches in Engineering Problems

$109.99
Symmetry in Mechanics

Symmetry in Mechanics

$59.99
Assessing Public Management Reforms

Assessing Public Management Reforms

$99.00
Community Planning to Foster Resilience in Children

Community Planning to Foster Resilience in Children

$84.99
Information Systems and Data Management

Information Systems and Data Management

$39.99
Die Affekte der Erziehung

Die Affekte der Erziehung

$69.99
Borehole Electromagnetic Telemetry System

Borehole Electromagnetic Telemetry System

$59.99
Wertorientierte Management-Incentivesysteme auf Basis interner Wertkennzahlen

Wertorientierte Management-Incentivesysteme auf Basis interner Wertkennzahlen

$74.99
Facility Management im Hochbau

Facility Management im Hochbau

$34.99
Musik in Baden Wrtemberg, Band 1: Jahrbuch 1996

Musik in Baden Wrtemberg, Band 1: Jahrbuch 1996

$39.99
Europeanization, Care and Gender

Europeanization, Care and Gender

$54.99
Hyperfine Interactions (C)

Hyperfine Interactions (C)

$169.99
Reviews of Environmental Contamination and Toxicology, Volume 227

Reviews of Environmental Contamination and Toxicology, Volume 227

$109.99
The Carnegie-Mellon Curriculum for Undergraduate Computer Science

The Carnegie-Mellon Curriculum for Undergraduate Computer Science

$54.99
previous
next