Adversary-Aware Learning Techniques and Trends in Cybersecurity

Adversary-Aware Learning Techniques and Trends in Cybersecurity [electronic resource] / edited by Prithviraj Dasgupta, Joseph B. Collins, Ranjeev Mittu. - 1st ed. 2021. - X, 227 p. 68 illus., 50 illus. in color. online resource.

Part I: Game-Playing AI and Game Theory-based Techniques for Cyber Defenses -- 1. Rethinking Intelligent Behavior as Competitive Games for Handling Adversarial Challenges to Machine Learning -- 2. Security of Distributed Machine Learning:A Game-Theoretic Approach to Design Secure DSVM -- 3. Be Careful When Learning Against Adversaries: Imitative Attacker Deception in Stackelberg Security Games -- Part II: Data Modalities and Distributed Architectures for Countering Adversarial Cyber Attacks -- 4. Adversarial Machine Learning in Text: A Case Study of Phishing Email Detection with RCNN model -- 5. Overview of GANs for Image Synthesis and Detection Methods -- 6. Robust Machine Learning using Diversity and Blockchain -- Part III: Human Machine Interactions and Roles in Automated Cyber Defenses -- 7. Automating the Investigation of Sophisticated Cyber Threats with Cognitive Agents -- 8. Integrating Human Reasoning and Machine Learning to Classify Cyber Attacks -- 9. Homology as an Adversarial Attack Indicator -- Cyber-(in)security, revisited: Proactive Cyber-defenses, Interdependence and Autonomous Human Machine Teams (A-HMTs).

This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner.

9783030556921

10.1007/978-3-030-55692-1 doi


Artificial intelligence.
Data protection.
Artificial Intelligence.
Data and Information Security.

Q334-342 TA347.A78

006.3
© 2024 IIIT-Delhi, library@iiitd.ac.in