• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Adversarial machine learning. /

پدید آورنده
Anthony D. Joseph ; Blaine Nelson ; Benjamin I.P. Rubinstein.

موضوع
Communication.,Computer science.,Information Theory and Security,Information theory.,Machine learning.,Pattern perception.,Pattern Recognition and Machine Learning,Communication.,Computer science.,COMPUTERS-- Security-- General.,Information theory.,Machine learning.,Pattern perception.

رده
QA76

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1107338549
(Number (ISBN
9781107338548
Erroneous ISBN
1107043468
Erroneous ISBN
9781107043466

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Adversarial machine learning. /
General Material Designation
[Book]
First Statement of Responsibility
Anthony D. Joseph ; Blaine Nelson ; Benjamin I.P. Rubinstein.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cambridge :
Name of Publisher, Distributor, etc.
Cambridge University Press,
Date of Publication, Distribution, etc.
2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (338 pages)

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

SUMMARY OR ABSTRACT

Text of Note
Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race.

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9781107043466

TOPICAL NAME USED AS SUBJECT

Communication.
Computer science.
Information Theory and Security
Information theory.
Machine learning.
Pattern perception.
Pattern Recognition and Machine Learning
Communication.
Computer science.
COMPUTERS-- Security-- General.
Information theory.
Machine learning.
Pattern perception.

DEWEY DECIMAL CLASSIFICATION

Number
006
.
3/1
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76

OTHER CLASS NUMBERS

Class number
COM053000
System Code
bisacsh

PERSONAL NAME - PRIMARY RESPONSIBILITY

Joseph, Anthony D.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Nelson, Blaine.
Rubinstein, Benjamin I. P.

ORIGINATING SOURCE

Date of Transaction
20200822150409.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival