Machine learning algorithms: adversarial robustness in signal processing
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing al...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2022]
|
Schriftenreihe: | Wireless networks
|
Schlagworte: | |
Zusammenfassung: | This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks.The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm.This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide |
Beschreibung: | Chapter. 1. IntroductionChapter. 2. Optimal Feature Manipulation Attacks Against Linear RegressionChapter. 3. On the Adversarial Robustness of LASSO Based Feature SelectionChapter. 4. On the Adversarial Robustness of Subspace LearningChapter. 5. Summary and ExtensionsChapter. 6. Appendix |
Beschreibung: | ix, 104 Seiten Illustrationen |
ISBN: | 9783031163746 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048851511 | ||
003 | DE-604 | ||
005 | 20230413 | ||
007 | t | ||
008 | 230308s2022 a||| |||| 00||| eng d | ||
020 | |a 9783031163746 |9 978-3-031-16374-6 | ||
024 | 3 | |a 9783031163746 | |
035 | |a (OCoLC)1351461307 | ||
035 | |a (DE-599)BVBBV048851511 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Li, Fuwei |e Verfasser |4 aut | |
245 | 1 | 0 | |a Machine learning algorithms |b adversarial robustness in signal processing |c Fuwei Li, Lifeng Lai, Shuguang Cui |
264 | 1 | |a Cham |b Springer |c [2022] | |
300 | |a ix, 104 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Wireless networks | |
500 | |a Chapter. 1. IntroductionChapter. 2. Optimal Feature Manipulation Attacks Against Linear RegressionChapter. 3. On the Adversarial Robustness of LASSO Based Feature SelectionChapter. 4. On the Adversarial Robustness of Subspace LearningChapter. 5. Summary and ExtensionsChapter. 6. Appendix | ||
520 | |a This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks.The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). | ||
520 | |a As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm.This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. | ||
520 | |a R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide | ||
650 | 4 | |a bicssc | |
650 | 4 | |a bicssc | |
650 | 4 | |a bisacsh | |
650 | 4 | |a bisacsh | |
650 | 4 | |a Wireless communication systems | |
650 | 4 | |a Mobile communication systems | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Machine learning | |
653 | |a Hardcover, Softcover / Informatik, EDV/Informatik | ||
700 | 1 | |a Lai, Lifeng |e Verfasser |4 aut | |
700 | 1 | |a Cui, Shuguang |e Verfasser |0 (DE-588)1096827891 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-16375-3 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034116775 |
Datensatz im Suchindex
_version_ | 1804184971606228992 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Li, Fuwei Lai, Lifeng Cui, Shuguang |
author_GND | (DE-588)1096827891 |
author_facet | Li, Fuwei Lai, Lifeng Cui, Shuguang |
author_role | aut aut aut |
author_sort | Li, Fuwei |
author_variant | f l fl l l ll s c sc |
building | Verbundindex |
bvnumber | BV048851511 |
ctrlnum | (OCoLC)1351461307 (DE-599)BVBBV048851511 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03766nam a2200469 c 4500</leader><controlfield tag="001">BV048851511</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230413 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230308s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031163746</subfield><subfield code="9">978-3-031-16374-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783031163746</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1351461307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048851511</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Fuwei</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning algorithms</subfield><subfield code="b">adversarial robustness in signal processing</subfield><subfield code="c">Fuwei Li, Lifeng Lai, Shuguang Cui</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ix, 104 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wireless networks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter. 1. IntroductionChapter. 2. Optimal Feature Manipulation Attacks Against Linear RegressionChapter. 3. On the Adversarial Robustness of LASSO Based Feature SelectionChapter. 4. On the Adversarial Robustness of Subspace LearningChapter. 5. Summary and ExtensionsChapter. 6. Appendix</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks.The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm.This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Informatik, EDV/Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lai, Lifeng</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cui, Shuguang</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1096827891</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-16375-3</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034116775</subfield></datafield></record></collection> |
id | DE-604.BV048851511 |
illustrated | Illustrated |
index_date | 2024-07-03T21:40:18Z |
indexdate | 2024-07-10T09:47:49Z |
institution | BVB |
isbn | 9783031163746 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034116775 |
oclc_num | 1351461307 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | ix, 104 Seiten Illustrationen |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series2 | Wireless networks |
spelling | Li, Fuwei Verfasser aut Machine learning algorithms adversarial robustness in signal processing Fuwei Li, Lifeng Lai, Shuguang Cui Cham Springer [2022] ix, 104 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Wireless networks Chapter. 1. IntroductionChapter. 2. Optimal Feature Manipulation Attacks Against Linear RegressionChapter. 3. On the Adversarial Robustness of LASSO Based Feature SelectionChapter. 4. On the Adversarial Robustness of Subspace LearningChapter. 5. Summary and ExtensionsChapter. 6. Appendix This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks.The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm.This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide bicssc bisacsh Wireless communication systems Mobile communication systems Artificial intelligence Machine learning Hardcover, Softcover / Informatik, EDV/Informatik Lai, Lifeng Verfasser aut Cui, Shuguang Verfasser (DE-588)1096827891 aut Erscheint auch als Online-Ausgabe 978-3-031-16375-3 |
spellingShingle | Li, Fuwei Lai, Lifeng Cui, Shuguang Machine learning algorithms adversarial robustness in signal processing bicssc bisacsh Wireless communication systems Mobile communication systems Artificial intelligence Machine learning |
title | Machine learning algorithms adversarial robustness in signal processing |
title_auth | Machine learning algorithms adversarial robustness in signal processing |
title_exact_search | Machine learning algorithms adversarial robustness in signal processing |
title_exact_search_txtP | Machine learning algorithms adversarial robustness in signal processing |
title_full | Machine learning algorithms adversarial robustness in signal processing Fuwei Li, Lifeng Lai, Shuguang Cui |
title_fullStr | Machine learning algorithms adversarial robustness in signal processing Fuwei Li, Lifeng Lai, Shuguang Cui |
title_full_unstemmed | Machine learning algorithms adversarial robustness in signal processing Fuwei Li, Lifeng Lai, Shuguang Cui |
title_short | Machine learning algorithms |
title_sort | machine learning algorithms adversarial robustness in signal processing |
title_sub | adversarial robustness in signal processing |
topic | bicssc bisacsh Wireless communication systems Mobile communication systems Artificial intelligence Machine learning |
topic_facet | bicssc bisacsh Wireless communication systems Mobile communication systems Artificial intelligence Machine learning |
work_keys_str_mv | AT lifuwei machinelearningalgorithmsadversarialrobustnessinsignalprocessing AT lailifeng machinelearningalgorithmsadversarialrobustnessinsignalprocessing AT cuishuguang machinelearningalgorithmsadversarialrobustnessinsignalprocessing |