Attacks, Defenses and Testing for Deep Learning - Jinyin Chen - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: E-Books (https://softwarez.info/Forum-E-Books) +--- Thread: Attacks, Defenses and Testing for Deep Learning - Jinyin Chen (/Thread-Attacks-Defenses-and-Testing-for-Deep-Learning-Jinyin-Chen) |
Attacks, Defenses and Testing for Deep Learning - Jinyin Chen - AD-TEAM - 06-11-2024
pdf | 23.03 MB | English | Isbn:9789819704248 | Author: Jinyin Chen, Ximin Zhang, Haibin Zheng | Year: 2024
About ebook: Attacks, Defenses and Testing for Deep Learning Quote:This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, wherethe attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model. |