Theoretical Foundations of Adversarial Binary Detection (Foundations and Trends® in Communications and Information Theory)

個数:

Theoretical Foundations of Adversarial Binary Detection (Foundations and Trends® in Communications and Information Theory)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 188 p.
  • 言語 ENG
  • 商品コード 9781680837643

Full Description

Binary detection is a ubiquitous problem in virtually all branches of science and technology. In many cases, binary detection must be carried out in a setting wherein the presence of an adversary aiming at inducing a wrong decision cannot be ruled out. Applications include network monitoring, spam filtering, multimedia forensics, video surveillance and biometric authentication to name but a few. In these cases, the attack is carried out at the time of testing. With the advent of widespread machine learning tools, the attacker can act during the learning phase, making it harder to detect. The main idea behind adversarial detection theory is to cast the detection problem into a game-theoretic framework. This allows the goals and the actions available to the two contenders to be rigorously defined. In this monograph, the authors address several variants of a general adversarial binary detection problem, depending on the knowledge available to the Defender and the Attacker of the statistical characterization of a system. They lead the reader through the considerations and solutions under two hypotheses, using a framework that can be adopted in many applications. This monograph, aimed at students, researchers and practitioners working in the application areas who want an accessible introduction to the theory behind Adversarial Binary Detection and the possible solutions to their particular problem.

Contents

1. Introduction
2. Background Notions and Tools
3. Binary Detection Game with Known Sources
4. Limit Performance and Source Distinguishability
5. Binary Detection Game with Training Data
6. Binary Detection Games with Corrupted Training
7. Summary and Outlook
Acknowledgements
Appendices
A. Regularity Properties of the Admissibility Set
B. Asymptotic Behavior of the Indistinguishability Regions
C. Security Margin Computation as a Minimum Cost Flow Problem
References

最近チェックした商品