AI, machine learning and deep learning: a security perspective
"Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in m...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Boca Raton
CRC Press
2023
|
Edition: | First edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781000878899/?ar |
Summary: | "Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use. While the above discussion focuses on the security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models/algorithms can be used for cyber security (i.e., use AI to achieve security). Since the AI/ML/DL security is a new emergent field, many researchers and industry people cannot obtain detailed, comprehensive understanding of this area. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then many sets of promising solutions are described to achieve AI security and privacy in this book. The features of this book consist of 7 aspects: This is the first book to explain various practical attacks and countermeasures to AI systems; Both quantitative math models and practical security implementations are provided; It covers both "securing the AI system itself" and "use AI to achieve security"; It covers all the advanced AI attacks and threats with detailed attack models; It provides the multiple solution spaces to the security and privacy issues in AI tools; The differences among ML and DL security/privacy issues are explained. Many practical security applications are covered"-- |
Item Description: | Includes bibliographical references and index. - Description based on print version record |
Physical Description: | 1 Online-Ressource illustrations. |
ISBN: | 9781003187158 1003187153 9781000878875 1000878872 9781000878899 1000878899 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-10006549X | ||
003 | DE-627-1 | ||
005 | 20240228121859.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240104s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781003187158 |c ebook |9 978-1-003-18715-8 | ||
020 | |a 1003187153 |9 1-003-18715-3 | ||
020 | |a 9781000878875 |c electronic bk. : PDF |9 978-1-000-87887-5 | ||
020 | |a 1000878872 |c electronic bk. : PDF |9 1-000-87887-2 | ||
020 | |a 9781000878899 |c electronic bk. : EPUB |9 978-1-000-87889-9 | ||
020 | |a 1000878899 |c electronic bk. : EPUB |9 1-000-87889-9 | ||
035 | |a (DE-627-1)10006549X | ||
035 | |a (DE-599)KEP10006549X | ||
035 | |a (ORHE)9781000878899 | ||
035 | |a (DE-627-1)10006549X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UYQ |2 bicssc | |
082 | 0 | |a 006.3/1028563 |2 23/eng/20221223 | |
245 | 0 | 0 | |a AI, machine learning and deep learning |b a security perspective |c edited by Fei Hu and Xiali Hei |
250 | |a First edition. | ||
263 | |a 2305 | ||
264 | 1 | |a Boca Raton |b CRC Press |c 2023 | |
300 | |a 1 Online-Ressource |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on print version record | ||
520 | |a "Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use. While the above discussion focuses on the security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models/algorithms can be used for cyber security (i.e., use AI to achieve security). Since the AI/ML/DL security is a new emergent field, many researchers and industry people cannot obtain detailed, comprehensive understanding of this area. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then many sets of promising solutions are described to achieve AI security and privacy in this book. The features of this book consist of 7 aspects: This is the first book to explain various practical attacks and countermeasures to AI systems; Both quantitative math models and practical security implementations are provided; It covers both "securing the AI system itself" and "use AI to achieve security"; It covers all the advanced AI attacks and threats with detailed attack models; It provides the multiple solution spaces to the security and privacy issues in AI tools; The differences among ML and DL security/privacy issues are explained. Many practical security applications are covered"-- | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Machine learning |x Security measures | |
650 | 0 | |a Deep learning (Machine learning) |x Security measures | |
650 | 0 | |a Computer security |x Data processing | |
650 | 0 | |a Artificial intelligence | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Apprentissage automatique ; Sécurité ; Mesures | |
650 | 4 | |a Apprentissage profond ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Informatique | |
650 | 4 | |a Intelligence artificielle | |
650 | 4 | |a artificial intelligence | |
650 | 4 | |a COMPUTERS / Artificial Intelligence | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Hu, Fei |d 1972- |e HerausgeberIn |4 edt | |
700 | 1 | |a Hei, Xiali |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781032034041 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032034041 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000878899/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-10006549X |
---|---|
_version_ | 1829007842163556352 |
adam_text | |
any_adam_object | |
author2 | Hu, Fei 1972- Hei, Xiali |
author2_role | edt edt |
author2_variant | f h fh x h xh |
author_facet | Hu, Fei 1972- Hei, Xiali |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)10006549X (DE-599)KEP10006549X (ORHE)9781000878899 |
dewey-full | 006.3/1028563 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3/1028563 |
dewey-search | 006.3/1028563 |
dewey-sort | 16.3 71028563 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04616cam a22006852c 4500</leader><controlfield tag="001">ZDB-30-ORH-10006549X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121859.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240104s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003187158</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-003-18715-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003187153</subfield><subfield code="9">1-003-18715-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000878875</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-000-87887-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000878872</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-000-87887-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000878899</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-000-87889-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000878899</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-000-87889-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)10006549X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP10006549X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000878899</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)10006549X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UYQ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3/1028563</subfield><subfield code="2">23/eng/20221223</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">AI, machine learning and deep learning</subfield><subfield code="b">a security perspective</subfield><subfield code="c">edited by Fei Hu and Xiali Hei</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">2305</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use. While the above discussion focuses on the security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models/algorithms can be used for cyber security (i.e., use AI to achieve security). Since the AI/ML/DL security is a new emergent field, many researchers and industry people cannot obtain detailed, comprehensive understanding of this area. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then many sets of promising solutions are described to achieve AI security and privacy in this book. The features of this book consist of 7 aspects: This is the first book to explain various practical attacks and countermeasures to AI systems; Both quantitative math models and practical security implementations are provided; It covers both "securing the AI system itself" and "use AI to achieve security"; It covers all the advanced AI attacks and threats with detailed attack models; It provides the multiple solution spaces to the security and privacy issues in AI tools; The differences among ML and DL security/privacy issues are explained. Many practical security applications are covered"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Machine learning</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Deep learning (Machine learning)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Apprentissage automatique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Apprentissage profond ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hu, Fei</subfield><subfield code="d">1972-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hei, Xiali</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032034041</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032034041</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000878899/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-10006549X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:43Z |
institution | BVB |
isbn | 9781003187158 1003187153 9781000878875 1000878872 9781000878899 1000878899 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press |
record_format | marc |
spelling | AI, machine learning and deep learning a security perspective edited by Fei Hu and Xiali Hei First edition. 2305 Boca Raton CRC Press 2023 1 Online-Ressource illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on print version record "Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use. While the above discussion focuses on the security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models/algorithms can be used for cyber security (i.e., use AI to achieve security). Since the AI/ML/DL security is a new emergent field, many researchers and industry people cannot obtain detailed, comprehensive understanding of this area. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then many sets of promising solutions are described to achieve AI security and privacy in this book. The features of this book consist of 7 aspects: This is the first book to explain various practical attacks and countermeasures to AI systems; Both quantitative math models and practical security implementations are provided; It covers both "securing the AI system itself" and "use AI to achieve security"; It covers all the advanced AI attacks and threats with detailed attack models; It provides the multiple solution spaces to the security and privacy issues in AI tools; The differences among ML and DL security/privacy issues are explained. Many practical security applications are covered"-- Computer networks Security measures Machine learning Security measures Deep learning (Machine learning) Security measures Computer security Data processing Artificial intelligence Réseaux d'ordinateurs ; Sécurité ; Mesures Apprentissage automatique ; Sécurité ; Mesures Apprentissage profond ; Sécurité ; Mesures Sécurité informatique ; Informatique Intelligence artificielle artificial intelligence COMPUTERS / Artificial Intelligence COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures Hu, Fei 1972- HerausgeberIn edt Hei, Xiali HerausgeberIn edt 9781032034041 Erscheint auch als Druck-Ausgabe 9781032034041 |
spellingShingle | AI, machine learning and deep learning a security perspective Computer networks Security measures Machine learning Security measures Deep learning (Machine learning) Security measures Computer security Data processing Artificial intelligence Réseaux d'ordinateurs ; Sécurité ; Mesures Apprentissage automatique ; Sécurité ; Mesures Apprentissage profond ; Sécurité ; Mesures Sécurité informatique ; Informatique Intelligence artificielle artificial intelligence COMPUTERS / Artificial Intelligence COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures |
title | AI, machine learning and deep learning a security perspective |
title_auth | AI, machine learning and deep learning a security perspective |
title_exact_search | AI, machine learning and deep learning a security perspective |
title_full | AI, machine learning and deep learning a security perspective edited by Fei Hu and Xiali Hei |
title_fullStr | AI, machine learning and deep learning a security perspective edited by Fei Hu and Xiali Hei |
title_full_unstemmed | AI, machine learning and deep learning a security perspective edited by Fei Hu and Xiali Hei |
title_short | AI, machine learning and deep learning |
title_sort | ai machine learning and deep learning a security perspective |
title_sub | a security perspective |
topic | Computer networks Security measures Machine learning Security measures Deep learning (Machine learning) Security measures Computer security Data processing Artificial intelligence Réseaux d'ordinateurs ; Sécurité ; Mesures Apprentissage automatique ; Sécurité ; Mesures Apprentissage profond ; Sécurité ; Mesures Sécurité informatique ; Informatique Intelligence artificielle artificial intelligence COMPUTERS / Artificial Intelligence COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures |
topic_facet | Computer networks Security measures Machine learning Security measures Deep learning (Machine learning) Security measures Computer security Data processing Artificial intelligence Réseaux d'ordinateurs ; Sécurité ; Mesures Apprentissage automatique ; Sécurité ; Mesures Apprentissage profond ; Sécurité ; Mesures Sécurité informatique ; Informatique Intelligence artificielle artificial intelligence COMPUTERS / Artificial Intelligence COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures |
work_keys_str_mv | AT hufei aimachinelearninganddeeplearningasecurityperspective AT heixiali aimachinelearninganddeeplearningasecurityperspective |