0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Distributed Artificial Intelligence - 4th International Conference, DAI 2022, Tianjin, China, December 15–17, 2022,... Distributed Artificial Intelligence - 4th International Conference, DAI 2022, Tianjin, China, December 15–17, 2022, Proceedings (Paperback, 1st ed. 2023)
Makoto Yokoo, Hong QIAO, Yevgeniy Vorobeychik, Jianye Hao
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Distributed Artificial Intelligence, DAI 2022, held in Tianjin, China, in December 2022. The 5 full papers presented in this book were carefully reviewed and selected from 12 submissions. DAI aims at bringing together international researchers and practitioners in related areas including general AI, multiagent systems, distributed learning, computational game theory, etc., to provide a single, high-profile, internationally renowned forum for research in the theory and practice of distributed AI.    

Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November... Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings (Paperback, 1st ed. 2019)
Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, Gyoergy Dan
R1,489 Discovery Miles 14 890 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.The 21 full papers presented together with 11 short papers were carefully reviewed and selected from 47 submissions.The papers focus on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods.

Adversarial Machine Learning (Paperback): Yevgeniy Vorobeychik, Murat Kantarcioglu Adversarial Machine Learning (Paperback)
Yevgeniy Vorobeychik, Murat Kantarcioglu
R1,613 Discovery Miles 16 130 Ships in 18 - 22 working days

The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicius objects they develop. The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning. We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research. Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Blou Moord
Francois Bloemhof Paperback R320 R300 Discovery Miles 3 000
The High Treason Club - The Boeremag On…
Karin Mitchell Paperback R340 R304 Discovery Miles 3 040
The Return Of The Gods
Jonathan Cahn Paperback R399 R367 Discovery Miles 3 670
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R420 R388 Discovery Miles 3 880
NKJV Holy Bible - Pink
Hardcover R299 R275 Discovery Miles 2 750
Doolhof
Rudie van Rensburg Paperback R365 R326 Discovery Miles 3 260
Recent Trends in Learning From Data…
Luca Oneto, Nicolo Navarin, … Hardcover R3,796 Discovery Miles 37 960
Zero Days
Ruth Ware Paperback R380 R300 Discovery Miles 3 000
Machine Learning for Biometrics…
Partha Pratim Sarangi, Madhumita Panda, … Paperback R2,570 Discovery Miles 25 700
Koeke en Terte - Aanvaar Mekaar se…
Susan Coetzer Paperback R285 R255 Discovery Miles 2 550

 

Partners