Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Backdoor Attacks against Learning-Based Algorithms

Best Price (Coupon Required):
Buy Backdoor Attacks against Learning-Based Algorithms for $116.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $129.00 - $129.00
BEST PRICE

Single Product Purchase

$116.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$129.00 $129.00

10% OFF
This deals requires coupon
$116.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031573880
Condition
New
Product Description

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Polyoxometalates: From Platonic Solids to Anti-Retroviral Activity

Polyoxometalates: From Platonic Solids to Anti-Retroviral Activity

$219.99
Dependable Computing - EDCC 2005

Dependable Computing - EDCC 2005

$54.99
Trans Rights and Wrongs

Trans Rights and Wrongs

$139.00
Management of Knowledge Imperfection in Building Intelligent Systems

Management of Knowledge Imperfection in Building Intelligent Systems

$84.99
Wissenschaftsleadership

Wissenschaftsleadership

$49.99
Telematik im Personenverkehr

Telematik im Personenverkehr

$59.99
ReThinking Management

ReThinking Management

$64.99
Modeling the Interplay Between Human Behavior and the Spread of Infectious Diseases

Modeling the Interplay Between Human Behavior and the Spread of Infectious Diseases

$109.99
Aktuelle Anstze zur Umsetzung der UN-Nachhaltigkeitsziele

Aktuelle Anstze zur Umsetzung der UN-Nachhaltigkeitsziele

$84.99
Applied Intelligence and Informatics

Applied Intelligence and Informatics

$79.99
Koopkurrenz in internationalen Luftverkehrsallianzen

Koopkurrenz in internationalen Luftverkehrsallianzen

$64.99
The Geometry of Iterated Loop Spaces

The Geometry of Iterated Loop Spaces

$19.99
South Africa's Post-Apartheid Military

South Africa's Post-Apartheid Military

$109.99
Johann Wolfgang Goethe: Leiden des jungen Werthers

Johann Wolfgang Goethe: Leiden des jungen Werthers

$59.99
Hollow Norms and the Responsibility to Protect

Hollow Norms and the Responsibility to Protect

$39.99
PCR: Clinical Diagnostics and Research

PCR: Clinical Diagnostics and Research

$109.99
Akustische berwachung automatisierter Fgeprozesse

Akustische berwachung automatisierter Fgeprozesse

$84.99
Reading Terrestrial Planet Evolution in Isotopes and Element Measurements

Reading Terrestrial Planet Evolution in Isotopes and Element Measurements

$179.99
Familienmitglied Fernsehen

Familienmitglied Fernsehen

$44.99
Twelfth International Seaweed Symposium

Twelfth International Seaweed Symposium

$74.99
Muscle Development in Drosophilia

Muscle Development in Drosophilia

$129.00
H. Rietschels Leitfaden der Heiz- und Lftungstechnik

H. Rietschels Leitfaden der Heiz- und Lftungstechnik

$44.99
The BBC, The 'War on Terror' and the Discursive Construction of Terrorism

The BBC, The 'War on Terror' and the Discursive Construction of Terrorism

$139.99
Social Capital Construction and Governance in Central Asia

Social Capital Construction and Governance in Central Asia

$119.99
Vorstadien des Krebses

Vorstadien des Krebses

$59.99
The GEO Handbook on Biodiversity Observation Networks

The GEO Handbook on Biodiversity Observation Networks

$59.99
Die Versorgung psychischer Erkrankungen in Deutschland

Die Versorgung psychischer Erkrankungen in Deutschland

$29.99
Foundations of Potential Theory

Foundations of Potential Theory

$54.99
Supporting Web Search and Navigation by an Overlay Linking Structure

Supporting Web Search and Navigation by an Overlay Linking Structure

$109.00
Plastics Additives

Plastics Additives

$249.99
Vocational Vehicles and Applications

Vocational Vehicles and Applications

$69.99
Knowledge Management in the Innovation Process

Knowledge Management in the Innovation Process

$129.00
Central Bank Independence, Regulations, and Monetary Policy

Central Bank Independence, Regulations, and Monetary Policy

$159.99
Leitfaden zur Angestelltenversicherung

Leitfaden zur Angestelltenversicherung

$59.99
Biomechanics of Normal and Pathological Human Articulating Joints

Biomechanics of Normal and Pathological Human Articulating Joints

$39.99
Boswells Creative Gloom

Boswells Creative Gloom

$49.99
Intersphincteric Resection for Low Rectal Tumors

Intersphincteric Resection for Low Rectal Tumors

$169.99
New Cytokines as Potential Drugs

New Cytokines as Potential Drugs

$199.99
Advanced Transdisciplinary Engineering and Technology

Advanced Transdisciplinary Engineering and Technology

$199.99
Die Elvis-Tolle, die hatte ich mir unauffllig wachsen lassen

Die Elvis-Tolle, die hatte ich mir unauffllig wachsen lassen

$59.99
previous
next