Cantitate/Preț
Produs

Backdoor Attacks against Learning-Based Algorithms: Wireless Networks

Autor Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen
en Limba Engleză Hardback – 30 mai 2024

Structura progresivă: de la concept la implementare, volumul Backdoor Attacks against Learning-Based Algorithms oferă o analiză tehnică riguroasă asupra securității lanțului de aprovizionare pentru modelele DNN. Recomandăm această lucrare profesioniștilor din securitate cibernetică și cercetătorilor în AI, deoarece abordează vulnerabilitățile ce apar atunci când procesul de antrenare nu este controlat integral — fie prin utilizarea seturilor de date de la terți, fie prin platforme de antrenare externe.

Apreciem modul în care autorii, Shaofeng Li, Haojin Zhu și colaboratorii lor, trec dincolo de simpla teorie a „otrăvirii datelor”. Aceștia demonstrează cum steganografia și regularizarea pot fi utilizate pentru a crea trigger-e invizibile în clasificarea imaginilor, oferind chiar și metrici de măsurare a acestei invizibilități. În domeniul NLP, unde coruperea datelor textuale este ușor de detectat de către om, cartea propune atacuri ascunse care mențin lizibilitatea și contextul, vizând sarcini critice precum detectarea comentariilor toxice sau traducerea automată.

Abordarea diferă de Adversarial Learning and Secure AI de David J Miller prin faptul că este mai puțin abstractă și mult mai aplicabilă pe scenarii specifice de rețele wireless și sisteme distribuite. În timp ce Adversarial Machine Learning de Aneesh Sreevallabh Chivukula oferă o privire de ansamblu asupra perturbărilor, volumul de față se concentrează strict pe mecanismele de tip backdoor și, crucial, pe apărarea în sistemele e-Health federate. Structura cărții, reflectată în cuprins, ghidează cititorul de la o revizuire a literaturii de specialitate către studii de caz practice în servicii de rețea, culminând cu direcții viitoare de cercetare în securitatea algoritmilor de învățare.

Citește tot Restrânge

Din seria Wireless Networks

Preț: 95187 lei

Preț vechi: 118983 lei
-20%

Puncte Express: 1428

Carte disponibilă

Livrare economică 04-18 mai


Specificații

ISBN-13: 9783031573880
ISBN-10: 3031573889
Pagini: 168
Ilustrații: XI, 153 p. 58 illus., 56 illus. in color.
Dimensiuni: 160 x 241 x 15 mm
Greutate: 0.42 kg
Ediția:2024
Editura: Springer
Colecția Wireless Networks
Seria Wireless Networks

Locul publicării:Cham, Switzerland

De ce să citești această carte

Recomandăm această carte inginerilor de sistem și specialiștilor în securitate care lucrează cu modele de deep learning. Cititorul câștigă o înțelegere profundă a modului în care trigger-ele invizibile pot compromite integritatea AI și primește soluții concrete de detecție și apărare, esențiale pentru protejarea infrastructurilor critice, precum sistemele medicale digitale sau platformele de procesare a limbajului natural.


Despre autor

Autorii, în frunte cu Shaofeng Li și Haojin Zhu, sunt experți recunoscuți în securitatea rețelelor și algoritmi de învățare automată, contribuind activ în cadrul seriei Wireless Networks de la Springer. Deși unii dintre colaboratori, precum Xuemin (Sherman) Shen, au expertiză vastă în rețele wireless, este important de notat că echipa de autori îmbină cercetarea fundamentală cu aplicațiile practice în securitatea AI. Lucrarea de față reprezintă o evoluție a cercetărilor lor către protecția sistemelor distribuite și a arhitecturilor complexe de tip Federated Learning, adaptând rigoarea academică la nevoile actuale ale industriei de securitate cibernetică.


Descriere scurtă

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning.

Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters.

The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.


Cuprins

Introduction.- Literature Review of Backdoor Attacks.- Invisible Backdoor Attacks in Image Classification Based Network Services.- Hidden Backdoor Attacks in NLP Based Network Services.- Backdoor Attacks and Defense in FL.- Summary and Future Directions.


Notă biografică

Shaofeng Li received the B.E. degree in Software Engineering from Hunan University, China, and the M.E. degree in Computer Science from Northeastern University, China, in 2014 and 2017, respectively. He received the Ph.D. degree in Computer Science from Shanghai Jiao Tong University, Canada, in 2022. Starting from 2022, he works as a Post-doctoral fellow with the Department of Mathematics and Theory, Peng Cheng Laboratory. He focuses primarily on the areas of machine learning and security, specifically exploring the robustness of machine learning models against various adversarial attacks. His work has received the ACM CCS Best Paper Award Runner-Up. 

Haojin Zhu is a Professor with Department of Computer Science and Engineering, Shanghai Jiao Tong University, China. He received his B.Sc. degree (2002) from Wuhan University (China), M.Sc.(2005) degree from Shanghai Jiao Tong University (China), both in computer science and the Ph.D. in Electrical and Computer Engineering from the University of Waterloo (Canada), in 2009. He has published in more than 60 journals, including: JSAC, TDSC, TPDS, TMC, TIFS, TWC, TVT and more than 90 international conference papers, including IEEE S&P, ACM CCS, USENIX Security, ACM MOBICOM, NDSS, ACM MOBIHOC, IEEE INFOCOM, IEEE ICDCS. He received IEEE Fellow (2023), IEEE VTS Distinguished Lecturer (2022), the IEEE ComSoc Asia-Pacific Outstanding Young Researcher Award (2014) for the contribution to wireless network security and privacy, Top 100 Most Cited Chinese Papers Published in International Journals of 2014, Supervisor of Shanghai Excellent Master Thesis, and best paper awards of IEEE ICC 2007, Chinacom 2008 and best paper award runner up for Globecom 2014, WASA 2017, and ACM CCS 2021. He is leading the Network Security and Privacy Protection (NSEC) Lab.

Wen Wu received the B.E. degree in Information Engineering from South China University of Technology, Guangzhou, China, andthe M.E. degree in Electrical Engineering from University of Science and Technology of China, Hefei, China, in 2012 and 2015, respectively. He received the Ph.D. degree in Electrical and Computer Engineering from University of Waterloo, Waterloo, ON, Canada, in 2019. Starting from 2019, he works as a Post-doctoral fellow with the Department of Electrical and Computer Engineering, University of Waterloo. Currently, he is an associate professor with the Department of Mathematics and Theory, Pengcheng Laboratory. His research interests include millimeter-wave networks and AI-empowered wireless networks.

Xuemin (Sherman) Shen received the Ph.D. degree in electrical engineering from Rutgers University, New Brunswick, NJ, USA, in 1990. He is a University Professor with the Department of Electrical and Computer Engineering, University of Waterloo, Canada. His research focuses on network resource management, wireless network security, Internet of Things, 5G andbeyond, and vehicular ad hoc and sensor networks. Dr. Shen is a registered Professional Engineer of Ontario, Canada, an Engineering Institute of Canada Fellow, a Canadian Academy of Engineering Fellow, a Royal Society of Canada Fellow, a Chinese Academy of Engineering Foreign Member, and a Distinguished Lecturer of the IEEE Vehicular Technology Society and Communications Society.  Dr. Shen received the Canadian Award for Telecommunications Research from the Canadian Society of Information Theory (CSIT) in 2021, the R.A. Fessenden Award in 2019 from IEEE, Canada, Award of Merit from the Federation of Chinese Canadian Professionals (Ontario) in 2019, James Evans Avant Garde Award in 2018 from the IEEE Vehicular Technology Society, Joseph LoCicero Award in 2015 and Education Award in 2017 from the IEEE Communications Society, and Technical Recognition Award from Wireless Communications Technical Committee (2019) and AHSN Technical Committee (2013). Dr. Shen is the President of the IEEE Communications Society. He was the Vice President for Technical & Educational Activities, Vice President for Publications, Member-at-Large on the Board of Governors, Chair of the Distinguished Lecturer Selection Committee, Member of IEEE Fellow Selection Committee of the ComSoc. Dr. Shen served as the Editor-in-Chief of the IEEE IoT Journal, IEEE Network, and IET Communications.


Caracteristici

Thorough review of backdoor attacks and their potential mitigations in learning-based algorithms Focus on challenges such as design of invisible backdoor triggers and natural language processing systems Provides the fundamental principles for backdoor detections in federated learning