Adversarial robustness for machine learning / Pin-Yu Chen and Cho-Jui Hsieh.
Material type:
TextPublisher: London, United Kingdom ; San Diego, California : Academic Press, an imprint of Elsevier, 2023Description: xiv, 283 pages : illustrations ; 23 cmContent type: - text
- still image
- unmediated
- volume
- 9780128240205
- 006.31 C420a 23
- Q325.5 .C44 2023
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Graduate School Library | GRD 006.31 C420a 2023 (Browse shelf(Opens below)) | 1-2 | Available | 030257 | ||
Books
|
Main Library | Graduate School Library | GRD 006.31 C420a 2023 (Browse shelf(Opens below)) | 2-2 | Available | 030258 |
Browsing Main Library shelves, Shelving location: Graduate School Library Close shelf browser (Hides shelf browser)
| No cover image available |
|
|
|
|
|
|
||
| GRD 006.3 Sw35a 2022 Artificial intelligence : an executive guide to make AI work for your business / | GRD 006.3 W431w 2022 Why AI/data science projects fail : how to avoid project pitfalls / | GRD 006.31 C420a 2023 Adversarial robustness for machine learning / | GRD 006.31 C420a 2023 Adversarial robustness for machine learning / | GRD 006.31 H877m 2021 Machine learning for economics and finance in TensorFlow 2 : deep learning models for research and industry / | GRD 006.31 R618d 2021 Deep learning systems : algorithms, compilers, and processors for large-scale production / | GRD 006.31 Y3m 2022 Modern deep learning design and application development : versatile tools to solve deep learning problems / |
Includes bibliographical references and index.
Part 1. Preliminaries -- Background and motivation -- Part 2. Adversarial attack -- White-box adversarial attacks -- Black-box adversarial attacks -- Physical adversarial attacks -- Training-time adversarial attacks -- Adversarial attacks beyond image classification -- Part 3. Robustness verification -- Overview of neural network verification -- Incomplete neural network verification -- Complete neural network verification -- Verification against semantic perturbations -- Part 4. Adversarial defense -- Overview of adversarial defense -- Adversarial training -- Randomization-based defense -- Certified robustness training -- Adversary detection -- Adversarial robustness of beyond neural network models -- Adversarial robustness in meta-learning and contrastive learning -- Part 5. Applications beyond attack and defense -- Model reprogramming -- Contrastive explanations -- Model watermarking and fingerprinting -- Data augmentation for unsupervised machine learning.
There are no comments on this title.