Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
|
Buy Now
Machine Learning Algorithms - Adversarial Robustness in Signal Processing (Hardcover, 1st ed. 2022)
Loot Price: R3,130
Discovery Miles 31 300
You Save: R278
(8%)
|
|
Machine Learning Algorithms - Adversarial Robustness in Signal Processing (Hardcover, 1st ed. 2022)
Series: Wireless Networks
Expected to ship within 9 - 15 working days
|
This book demonstrates the optimal adversarial attacks against
several important signal processing algorithms. Through presenting
the optimal attacks in wireless sensor networks, array signal
processing, principal component analysis, etc, the authors reveal
the robustness of the signal processing algorithms against
adversarial attacks. Since data quality is crucial in signal
processing, the adversary that can poison the data will be a
significant threat to signal processing. Therefore, it is necessary
and urgent to investigate the behavior of machine learning
algorithms in signal processing under adversarial attacks. The
authors in this book mainly examine the adversarial robustness of
three commonly used machine learning algorithms in signal
processing respectively: linear regression, LASSO-based feature
selection, and principal component analysis (PCA). As to linear
regression, the authors derive the optimal poisoning data sample
and the optimal feature modifications, and also demonstrate the
effectiveness of the attack against a wireless distributed learning
system. The authors further extend the linear regression to
LASSO-based feature selection and study the best strategy to
mislead the learning system to select the wrong features. The
authors find the optimal attack strategy by solving a bi-level
optimization problem and also illustrate how this attack influences
array signal processing and weather data analysis. In the end, the
authors consider the adversarial robustness of the subspace
learning problem. The authors examine the optimal modification
strategy under the energy constraints to delude the PCA-based
subspace learning algorithm. This book targets researchers working
in machine learning, electronic information, and information theory
as well as advanced-level students studying these subjects. R&D
engineers who are working in machine learning, adversarial machine
learning, robust machine learning, and technical consultants
working on the security and robustness of machine learning are
likely to purchase this book as a reference guide.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.