Not with a bug, but with a sticker: attacks on machine learning systems and what to do about them
"A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most s...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons, Inc.
[2023]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119883982/?ar |
Zusammenfassung: | "A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour - from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria - recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes. Based on hundreds of interviews of academic researchers, policy makers, business leaders and national security experts, the authors compile the complex science of attacking AI systems with color and flourish and provide a front row seat to those who championed this change. Grounded in real world examples of previous attacks, you will learn how adversaries can upend the reliability of otherwise robust AI systems with straightforward exploits. The steeplechase to solve this problem has already begun: Nations and organizations are aware that securing AI systems brings forth an indomitable advantage: the prize is not just to keep AI systems safe but also the ability to disrupt the competition's AI systems. An essential and eye-opening resource for machine learning and software engineers, policy makers and business leaders involved with artificial intelligence, and academics studying topics including cybersecurity and computer science, Not With A Bug, But With A Sticker is a warning--albeit an entertaining and engaging one--we should all heed. How we secure our AI systems will define the next decade. The stakes have never been higher, and public attention and debate on the issue has never been scarcer. The authors are donating the proceeds from this book to two charities: Black in AI and Bountiful Children's Foundation."-- |
Beschreibung: | Includes index. - Description based on print version record |
Umfang: | 1 Online-Ressource ( xxii, 202 Seiten:) illustrations |
ISBN: | 9781119883999 1119883997 9781119883982 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-094102589 | ||
003 | DE-627-1 | ||
005 | 20240228122007.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230802s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781119883999 |c electronic bk. |9 978-1-119-88399-9 | ||
020 | |a 1119883997 |c electronic bk. |9 1-119-88399-7 | ||
020 | |a 9781119883982 |9 978-1-119-88398-2 | ||
035 | |a (DE-627-1)094102589 | ||
035 | |a (DE-599)KEP094102589 | ||
035 | |a (ORHE)9781119883982 | ||
035 | |a (DE-627-1)094102589 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Kumar, Ram Shankar Siva |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Not with a bug, but with a sticker |b attacks on machine learning systems and what to do about them |c Ram Shankar Siva Kumar, Hyrum Anderson |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons, Inc. |c [2023] | |
264 | 4 | |c © 2023 | |
300 | |a 1 Online-Ressource ( xxii, 202 Seiten:) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Description based on print version record | ||
520 | |a "A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour - from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria - recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes. Based on hundreds of interviews of academic researchers, policy makers, business leaders and national security experts, the authors compile the complex science of attacking AI systems with color and flourish and provide a front row seat to those who championed this change. Grounded in real world examples of previous attacks, you will learn how adversaries can upend the reliability of otherwise robust AI systems with straightforward exploits. The steeplechase to solve this problem has already begun: Nations and organizations are aware that securing AI systems brings forth an indomitable advantage: the prize is not just to keep AI systems safe but also the ability to disrupt the competition's AI systems. An essential and eye-opening resource for machine learning and software engineers, policy makers and business leaders involved with artificial intelligence, and academics studying topics including cybersecurity and computer science, Not With A Bug, But With A Sticker is a warning--albeit an entertaining and engaging one--we should all heed. How we secure our AI systems will define the next decade. The stakes have never been higher, and public attention and debate on the issue has never been scarcer. The authors are donating the proceeds from this book to two charities: Black in AI and Bountiful Children's Foundation."-- | ||
650 | 0 | |a Machine learning | |
650 | 0 | |a Computer security | |
650 | 4 | |a Apprentissage automatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Machine learning | |
700 | 1 | |a Anderson, Hyrum S. |e VerfasserIn |4 aut | |
710 | 2 | |a ProQuest (Firm) |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1119883989 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1119883989 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119883982/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-094102589 |
---|---|
_version_ | 1821494939466334208 |
adam_text | |
any_adam_object | |
author | Kumar, Ram Shankar Siva Anderson, Hyrum S. |
author_corporate | ProQuest (Firm) |
author_corporate_role | ctb |
author_facet | Kumar, Ram Shankar Siva Anderson, Hyrum S. ProQuest (Firm) |
author_role | aut aut |
author_sort | Kumar, Ram Shankar Siva |
author_variant | r s s k rss rssk h s a hs hsa |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)094102589 (DE-599)KEP094102589 (ORHE)9781119883982 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03786cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-094102589</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122007.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230802s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119883999</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-88399-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119883997</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-88399-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119883982</subfield><subfield code="9">978-1-119-88398-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094102589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP094102589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119883982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094102589</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Ram Shankar Siva</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Not with a bug, but with a sticker</subfield><subfield code="b">attacks on machine learning systems and what to do about them</subfield><subfield code="c">Ram Shankar Siva Kumar, Hyrum Anderson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource ( xxii, 202 Seiten:)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour - from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria - recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes. Based on hundreds of interviews of academic researchers, policy makers, business leaders and national security experts, the authors compile the complex science of attacking AI systems with color and flourish and provide a front row seat to those who championed this change. Grounded in real world examples of previous attacks, you will learn how adversaries can upend the reliability of otherwise robust AI systems with straightforward exploits. The steeplechase to solve this problem has already begun: Nations and organizations are aware that securing AI systems brings forth an indomitable advantage: the prize is not just to keep AI systems safe but also the ability to disrupt the competition's AI systems. An essential and eye-opening resource for machine learning and software engineers, policy makers and business leaders involved with artificial intelligence, and academics studying topics including cybersecurity and computer science, Not With A Bug, But With A Sticker is a warning--albeit an entertaining and engaging one--we should all heed. How we secure our AI systems will define the next decade. The stakes have never been higher, and public attention and debate on the issue has never been scarcer. The authors are donating the proceeds from this book to two charities: Black in AI and Bountiful Children's Foundation."--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Apprentissage automatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anderson, Hyrum S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1119883989</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1119883989</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119883982/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-094102589 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:21Z |
institution | BVB |
isbn | 9781119883999 1119883997 9781119883982 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource ( xxii, 202 Seiten:) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Kumar, Ram Shankar Siva VerfasserIn aut Not with a bug, but with a sticker attacks on machine learning systems and what to do about them Ram Shankar Siva Kumar, Hyrum Anderson Hoboken, New Jersey John Wiley & Sons, Inc. [2023] © 2023 1 Online-Ressource ( xxii, 202 Seiten:) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Description based on print version record "A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour - from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria - recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes. Based on hundreds of interviews of academic researchers, policy makers, business leaders and national security experts, the authors compile the complex science of attacking AI systems with color and flourish and provide a front row seat to those who championed this change. Grounded in real world examples of previous attacks, you will learn how adversaries can upend the reliability of otherwise robust AI systems with straightforward exploits. The steeplechase to solve this problem has already begun: Nations and organizations are aware that securing AI systems brings forth an indomitable advantage: the prize is not just to keep AI systems safe but also the ability to disrupt the competition's AI systems. An essential and eye-opening resource for machine learning and software engineers, policy makers and business leaders involved with artificial intelligence, and academics studying topics including cybersecurity and computer science, Not With A Bug, But With A Sticker is a warning--albeit an entertaining and engaging one--we should all heed. How we secure our AI systems will define the next decade. The stakes have never been higher, and public attention and debate on the issue has never been scarcer. The authors are donating the proceeds from this book to two charities: Black in AI and Bountiful Children's Foundation."-- Machine learning Computer security Apprentissage automatique Sécurité informatique Anderson, Hyrum S. VerfasserIn aut ProQuest (Firm) MitwirkendeR ctb 1119883989 Erscheint auch als Druck-Ausgabe 1119883989 |
spellingShingle | Kumar, Ram Shankar Siva Anderson, Hyrum S. Not with a bug, but with a sticker attacks on machine learning systems and what to do about them Machine learning Computer security Apprentissage automatique Sécurité informatique |
title | Not with a bug, but with a sticker attacks on machine learning systems and what to do about them |
title_auth | Not with a bug, but with a sticker attacks on machine learning systems and what to do about them |
title_exact_search | Not with a bug, but with a sticker attacks on machine learning systems and what to do about them |
title_full | Not with a bug, but with a sticker attacks on machine learning systems and what to do about them Ram Shankar Siva Kumar, Hyrum Anderson |
title_fullStr | Not with a bug, but with a sticker attacks on machine learning systems and what to do about them Ram Shankar Siva Kumar, Hyrum Anderson |
title_full_unstemmed | Not with a bug, but with a sticker attacks on machine learning systems and what to do about them Ram Shankar Siva Kumar, Hyrum Anderson |
title_short | Not with a bug, but with a sticker |
title_sort | not with a bug but with a sticker attacks on machine learning systems and what to do about them |
title_sub | attacks on machine learning systems and what to do about them |
topic | Machine learning Computer security Apprentissage automatique Sécurité informatique |
topic_facet | Machine learning Computer security Apprentissage automatique Sécurité informatique |
work_keys_str_mv | AT kumarramshankarsiva notwithabugbutwithastickerattacksonmachinelearningsystemsandwhattodoaboutthem AT andersonhyrums notwithabugbutwithastickerattacksonmachinelearningsystemsandwhattodoaboutthem AT proquestfirm notwithabugbutwithastickerattacksonmachinelearningsystemsandwhattodoaboutthem |