|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Somanath Tripathy , Harsh Kasyap , Minghong FangPublisher: Taylor & Francis Ltd Imprint: CRC Press Weight: 0.480kg ISBN: 9781041174622ISBN 10: 1041174624 Pages: 156 Publication Date: 04 December 2025 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of Contents1. Introduction to Machine Learning a. Types of Learning b. Learning Tasks c. Cost Function d. Optimization e. Evaluation Metrics f. Artificial Neural Network g. Implementation 2. Federated Learning a. Importance of FL b. Types of FL c. Applications in FL d. Challenges in FL e. Security and Privacy Issues f. Defense Techniques g. Privacy-Preserving Byzantine-Robust FL h. Implementation 3. Poisoning Attacks in FL a. Attacker b. Label flipping attack c. Gaussian attack d. LIE attack e. Krum attack f. Trim attack g. Shejwalkar attack h. Scaling attack i. Edge attack j. Vulnerabilities in Cosine Similarity-based Defenses k. Implementation 4. Inference Attacks in FL a. Attacker goal b. Data reconstruction attacks c. Membership inference attacks d. Property inference attacks e. Implementation 5. Byzantine Robust Defenses a. Design goals b. Krum c. Median and Trimmed Mean d. Bulyan e. FoolsGold f. FLTrust g. Moat h. DeFL i. RDFL j. FLTC k. Implementation 6. Privacy-Preserving FL a. Differential Privacy b. DPFL: A Client Level c. Homomorphic d. BatchCrypt: HE-based Scheme e. Threshold Multi-key HE Scheme f. Secure Multi-Party Computation g. Practical Secure Aggregation h. Summary i. ImplementationReviewsAuthor InformationSomanath Tripathy received his PhD from IIT Guwahati in 2007. Currently, he is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Patna, where he has been a faculty member since December 2008. Prof. Tripathy has held significant administrative positions at IIT Patna, including Associate Dean of Academics (January 2016 - March 2017), Head, Computer Centre (November 2022-November 2023) and Associate Dean of Administration (July 2021 - November 2023). His research interests encompass Cybersecurity, Malware Detection, Secure Machine Learning, Lightweight Cryptography, and Blockchain. Tripathy holds two patents and has published over 130 research papers in reputed journals and conferences. He has led several projects as Principal Investigator, notably his team developed a malware detection app presented to the Bureau of Police Research and Development (BPRD) and the Ministry of Home Affairs (MHA) as part of a sponsored project. Tripathy is currently an editor of the IETE Technical Review and an associate editor of the journal Multimedia Tools and Applications. Harsh Kasyap is an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (BHU), Varanasi, India. He is also an honorary research fellow at WMG, University of Warwick, UK. Prior to that, Harsh was a Research Associate, working in the Alan Turing Institute London, where he established significant research collaborations with the HSBC, Bank of Italy and TNO, advancing the fields of data privacy, AI security and fairness. He obtained his Ph.D. from the IIT Patna, India. His Ph.D. thesis title was “Security and Privacy Preserving Techniques for Federated Learning”. His research interests are Federated Learning, Machine Learning Security, Trustworthy AI, Privacy and Data Security. Minghong Fang is a tenure-track Assistant Professor in the Department of Computer Science and Engineering at the University of Louisville. He was a Postdoctoral Associate in the Department of Electrical and Computer Engineering at Duke University from 2022 to 2024. He received his Ph.D. degree from the Department of Electrical and Computer Engineering at The Ohio State University in August 2022. He has published several high-impact research papers in top-tier security conferences, including the USENIX Security Symposium, the ACM Conference on Computer and Communications Security (CCS), and the Network and Distributed System Security (NDSS) Symposium. Notably, his USENIX Security 2020 paper was selected as one of the “Normalized Top-100 Security Papers Since 1981”. His research interests broadly span various aspects of AI safety and security. Tab Content 6Author Website:Countries AvailableAll regions |
||||