Back to Search

Reverse Engineering of Deceptions on Machine- And Human-Centric Attacks

AUTHOR Liu, Jiancheng; Asnani, Vishal; Yao, Yuguang
PUBLISHER Now Publishers (03/26/2024)
PRODUCT TYPE Paperback (Paperback)

Description
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversarial machine learning. It delves into the intricacies of machine and human-centric attacks, providing a holistic understanding of how adversarial strategies can be reverse-engineered to safeguard AI systems. For machine-centric attacks, reverse engineering methods for pixel-level perturbations are covered, as well as adversarial saliency maps and victim model information in adversarial examples. In the realm of human-centric attacks, the focus shifts to generative model information inference and manipulation localization from generated images. In this work, a forward-looking perspective on the challenges and opportunities associated with RED are presented. In addition, foundational and practical insights in the realms of AI security and trustworthy computer vision are provided.
Show More
Product Format
Product Details
ISBN-13: 9781638283409
ISBN-10: 1638283400
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 112
Carton Quantity: 72
Product Dimensions: 6.14 x 0.23 x 9.21 inches
Weight: 0.37 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | Security - General
Computers | Internet - Online Safety & Privacy
Computers | Artificial Intelligence - General
Descriptions, Reviews, Etc.
publisher marketing
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversarial machine learning. It delves into the intricacies of machine and human-centric attacks, providing a holistic understanding of how adversarial strategies can be reverse-engineered to safeguard AI systems. For machine-centric attacks, reverse engineering methods for pixel-level perturbations are covered, as well as adversarial saliency maps and victim model information in adversarial examples. In the realm of human-centric attacks, the focus shifts to generative model information inference and manipulation localization from generated images. In this work, a forward-looking perspective on the challenges and opportunities associated with RED are presented. In addition, foundational and practical insights in the realms of AI security and trustworthy computer vision are provided.
Show More
List Price $80.00
Your Price  $79.20
Paperback