logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Backdoor Attacks Against Learningbased Algorithms Wireless Networks 1st Edition Shaofeng Li

  • SKU: BELL-58260140
Backdoor Attacks Against Learningbased Algorithms Wireless Networks 1st Edition Shaofeng Li
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Backdoor Attacks Against Learningbased Algorithms Wireless Networks 1st Edition Shaofeng Li instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 6.98 MB
Pages: 161
Author: Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen
ISBN: 9783031573880, 3031573889
Language: English
Year: 2024
Edition: 1

Product desciption

Backdoor Attacks Against Learningbased Algorithms Wireless Networks 1st Edition Shaofeng Li by Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (sherman) Shen 9783031573880, 3031573889 instant download after payment.

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy.…

Related Products