Cantitate/Preț
Produs

Machine Learning Algorithms: Adversarial Robustness in Signal Processing: Wireless Networks

Autor Fuwei Li, Lifeng Lai, Shuguang Cui
en Limba Engleză Hardback – 16 noi 2022
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks.

The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm.

This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 90249 lei  6-8 săpt.
  Springer International Publishing – 17 noi 2023 90249 lei  6-8 săpt.
Hardback (1) 79827 lei  3-5 săpt. +1690 lei  10-14 zile
  Springer International Publishing – 16 noi 2022 79827 lei  3-5 săpt. +1690 lei  10-14 zile

Din seria Wireless Networks

Preț: 79827 lei

Preț vechi: 99785 lei
-20% Nou

Puncte Express: 1197

Preț estimativ în valută:
15277 15869$ 12690£

Carte disponibilă

Livrare economică 11-25 ianuarie 25
Livrare express 31 decembrie 24 - 04 ianuarie 25 pentru 2689 lei

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031163746
ISBN-10: 3031163745
Pagini: 104
Ilustrații: IX, 104 p. 23 illus., 22 illus. in color.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.34 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Wireless Networks

Locul publicării:Cham, Switzerland

Cuprins

Chapter. 1. Introduction.- Chapter. 2. Optimal Feature Manipulation Attacks Against Linear Regression.- Chapter. 3. On the Adversarial Robustness of LASSO Based Feature Selection.- Chapter. 4. On the Adversarial Robustness of Subspace Learning.- Chapter. 5. Summary and Extensions.- Chapter. 6. Appendix.

Notă biografică

Fuwei Li received his B.S. and M.S. degrees from University of Electronic Science and Technology of China, Sichuan, China, in 2012 and 2015, respectively. During that time, his research focused on sparse signal processing and Bayesian compressed sensing. He received his Ph.D. degree from University of California, Davis, CA, in 2021. During his Ph.D. study, he mainly focused on the adversarial robustness of machine learning algorithms. Now, he is a scientist of AI perception algorithm at Black Sesame Tech. Inc.
Lifeng Lai received the B.E. and M. E. degrees from Zhejiang University, Hangzhou, China in 2001 and 2004 respectively, and the PhD degree from The Ohio State University at Columbus, OH, in 2007. He was a postdoctoral research associate at Princeton University from 2007 to 2009, an assistant professor at University of Arkansas, Little Rock from 2009 to 2012, and an assistant professor at Worcester Polytechnic Institute from 2012 to 2016. He joined the Department of Electrical and Computer Engineering at University of California, Davis as an associate professor in 2016, and was promoted to professor in 2020. His current research interest includes information theory, stochastic signal processing, machine learning and their applications. Dr. Lai was a Distinguished University Fellow of the Ohio State University from 2004 to 2007. He is a co-recipient of the Best Paper Award from IEEE Global Communications Conference (Globecom) in 2008, the Best Paper Award from IEEE Conference on Communications (ICC) in 2011 and the Best Paper Award from IEEE Smart Grid Communications (SmartGridComm) in 2012. He received the National Science Foundation CAREER Award in 2011 and Northrop Young Researcher Award in 2012. He served as a Guest Editor for IEEE Journal on Selected Areas in Communications, Special Issue on Signal Processing Techniques for Wireless Physical Layer Security from 2012 to 2013, an editor for IEEE Transactionson Wireless Communications from 2013 to 2018, and an associate editor for IEEE Transactions on Information Forensics and Security from 2015 to 2020. He is currently serving as an associate editor for IEEE Transactions on Information Theory, IEEE Transactions on Mobile Computing and IEEE Transactions on Signal and Information Processing over Networks.
Shuguang Cui received his Ph.D in Electrical Engineering from Stanford University, California, USA, in 2005. Afterwards, he has been working as assistant, associate, full, Chair Professor in Electrical and Computer Engineering at the Univ. of Arizona, Texas A&M University, UC Davis, and CUHK at Shenzhen respectively. He has also served as the Executive Dean for the School of Science and Engineering at CUHK, Shenzhen, the Director for the Future Network of Intelligence Institute, and the Executive Vice Director at Shenzhen Research Institute of Big Data. His current research interests focus on data driven large-scale system control and resource management, large data set analysis, IoT system design, energy harvesting based communication system design, and cognitive network optimization. He was selected as the Thomson Reuters Highly Cited Researcher and listed in the Worlds’ Most Influential Scientific Minds by ScienceWatch in 2014. He was the recipient of the IEEE Signal Processing Society 2012 Best Paper Award. He has served as the general co-chair and TPC co-chairs for many IEEE conferences. He has also been serving as the area editor for IEEE Signal Processing Magazine, and associate editors for IEEE Transactions on Big Data, IEEE Transactions on Signal Processing, IEEE JSAC Series on Green Communications and Networking, and IEEE Transactions on Wireless Communications. He has been the elected member for IEEE Signal Processing Society SPCOM Technical Committee (2009~2014) and the elected Chair for IEEE ComSoc Wireless Technical Committee (2017~2018). He is a member of the SteeringCommittee for IEEE Transactions on Big Data and the Chair of the Steering Committee for IEEE Transactions on Cognitive Communications and Networking. He was also a member of the IEEE ComSoc Emerging Technology Committee. He was elected as an IEEE Fellow in 2013, an IEEE ComSoc Distinguished Lecturer in 2014, and IEEE VT Society Distinguished Lecturer in 2019. He has won the IEEE ICC best paper award, ICIP best paper finalist, and the IEEE Globecom best paper award all in 2020.

Textul de pe ultima copertă

This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks.

The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm.

This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.


Caracteristici

Demonstrates how machine learning is widely used in signal processing Investigates the adversarial robustness of signal processing algorithms Conducts an attack on a principal regression problem