Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.
Binary detection is a ubiquitous problem in virtually all branches of science and technology. In many cases, binary detection must be carried out in a setting wherein the presence of an adversary aiming at inducing a wrong decision cannot be ruled out. Applications include network monitoring, spam filtering, multimedia forensics, video surveillance and biometric authentication to name but a few. In these cases, the attack is carried out at the time of testing. With the advent of widespread machine learning tools, the attacker can act during the learning phase, making it harder to detect. The main idea behind adversarial detection theory is to cast the detection problem into a game-theoretic framework. This allows the goals and the actions available to the two contenders to be rigorously defined. In this monograph, the authors address several variants of a general adversarial binary detection problem, depending on the knowledge available to the Defender and the Attacker of the statistical characterization of a system. They lead the reader through the considerations and solutions under two hypotheses, using a framework that can be adopted in many applications. This monograph, aimed at students, researchers and practitioners working in the application areas who want an accessible introduction to the theory behind Adversarial Binary Detection and the possible solutions to their particular problem.
|
You may like...
Batman v Superman - Dawn Of Justice…
Ben Affleck, Henry Cavill, …
Blu-ray disc
(3)
R549 Discovery Miles 5 490
|