Tekijä: Anthony D. Joseph; Blaine Nelson; Benjamin I. P. Rubinstein; J. D. Tygar Kustantaja: Cambridge University Press (2019) Saatavuus: Noin 11-14 arkipäivää
Tekijä: J. Larry Jameson; Dennis Kasper; Stephen Hauser; Dan Longo; Anthony Fauci; Joseph Loscalzo Kustantaja: McGraw-Hill Education - Europe (2015) Saatavuus: Noin 17-20 arkipäivää
Tekijä: Joseph Loscalzo; Anthony Fauci; Dennis Kasper; Stephen Hauser; Dan Longo; J. Larry Jameson Kustantaja: McGraw Hill / Medical (2022) Saatavuus: Noin 17-20 arkipäivää
Tekijä: Scott D. Anthony; Mark W. Johnson; Joseph V. Sinfield; Elizabeth J. Altman Kustantaja: Harvard Business Review Press (2008) Saatavuus: Ei tiedossa
Tekijä: J. Joseph Clement; William F. Filter; Patrick M. Lenahan; Anthony S. Oates; Robert Rosenberg Kustantaja: Materials Research Society (1996) Saatavuus: Arvioimme, että tuote lähetetään meiltä noin 1-3 viikossa
Tekijä: S. Andrew Josephson; Dennis Kasper; Anthony Fauci; Stephen Hauser; Dan Longo; J. Larry Jameson; Joseph Loscalzo Kustantaja: McGraw-Hill Education - Europe (2021) Saatavuus: Ei tiedossa
Tekijä: Anthony Fauci; Eugene Braunwald; Dennis Kasper; Stephen Hauser; Dan Longo; J. Larry Jameson; Joseph Loscalzo Kustantaja: McGraw-Hill Education / Medical (2008) Saatavuus: Loppuunmyyty.
Tekijä: Anthony Fauci; Eugene Braunwald; Dennis Kasper; Stephen Hauser; Dan Longo; J. Larry Jameson; Joseph Loscalzo Kustantaja: McGraw-Hill Education / Medical (2008) Saatavuus: Loppuunmyyty.
Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race.