You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabilities, in which they could be deceived to return preferred predictions. Therefore, carefully crafted adversarial objects may impact the trust of machine learning systems compromising the reliability of their predictions, irrespective of the field in which they are deployed. The goal of this book is to improve the understanding of adversarial attacks, particularly in the malware context, and leverage the knowledge to explore defenses against adaptive adversaries. Furthermore, to study systemic weaknesses that can improve the resilience of machine learning models.
The multi-volume set LNAI 12975 until 12979 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2021, which was held during September 13-17, 2021. The conference was originally planned to take place in Bilbao, Spain, but changed to an online event due to the COVID-19 pandemic. The 210 full papers presented in these proceedings were carefully reviewed and selected from a total of 869 submissions. The volumes are organized in topical sections as follows: Research Track: Part I: Online learning; reinforcement learning; time series, streams, and sequence models; transfer and multi-task learning; semi-supervised and f...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. H...
The author includes not only information about the most important advances in the field of cryptology of the past decade-such as the Data Encryption Standard (DES), public-key cryptology, and the RSA algorithm-but also the research results of the last three years: the Shamir, the Lagarias-Odlyzko, and the Brickell attacks on the Knapsack methods; the new Knapsack method using Galois fields by Chor and Rivest; and the recent analysis by Kaliski, Rivest, and Sherman of group-theoretic properties of the Data Encryption Standard (DES).
None
CD-ROM contains: Open source code needed for user space implementation of SCTP presented in text
With information on over 500 organizations, their founders and membership, this unique encyclopedia is an invaluable resource on the history of African-American activism. Entries on both historical and contemporary organizations include: * African Aid Society * African-Americans for Humanism * Black Academy of Arts and Letters * Black Women's Liberation Committee * Minority Women in Science * National Association of Black Geologists and Geophysicists * National Dental Association * National Medical Association * Negro Railway Labor Executives Committee * Pennsylvania Freedmen's Relief Association * Women's Missionary Society, African Methodist Episcopal Church * and many more.
Afghanistan : five years after 9/11 : hearing before the Committee on International Relations, House of Representatives, One Hundred Ninth Congress, second session, September 20, 2006.