- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
As data becomes more abundant and widespread across personal devices, the need for secure, privacy-aware machine learning is growing. Federated Learning (FL) offers a promising solution, enabling smart devices to collaboratively train models without sharing raw data.
Andere Kunden interessierten sich auch für
J. ChangPrivacy-Preserving Machine Learning54,99 €
Advanced Techniques and Applications of Cybersecurity and Forensics188,99 €
Michael BrassGovernance, Risk and Compliance69,99 €
Kyle GallatinMachine Learning with Python Cookbook51,99 €
Jonathan Katz (University of Maryland, College Park, USA)Introduction to Modern Cryptography98,99 €
Brij B. Gupta (International Center for AI Director & CCRI)A Beginner's Guide to Internet of Things Security26,99 €
Intelligent Cyber-Physical Systems Security for Industry 4.0158,99 €-
-
-
As data becomes more abundant and widespread across personal devices, the need for secure, privacy-aware machine learning is growing. Federated Learning (FL) offers a promising solution, enabling smart devices to collaboratively train models without sharing raw data.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 156
- Erscheinungstermin: 4. Dezember 2025
- Englisch
- Abmessung: 216mm x 140mm x 11mm
- Gewicht: 328g
- ISBN-13: 9781041174622
- ISBN-10: 1041174624
- Artikelnr.: 75458981
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 156
- Erscheinungstermin: 4. Dezember 2025
- Englisch
- Abmessung: 216mm x 140mm x 11mm
- Gewicht: 328g
- ISBN-13: 9781041174622
- ISBN-10: 1041174624
- Artikelnr.: 75458981
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Somanath Tripathy received his PhD from IIT Guwahati in 2007. Currently, he is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Patna, where he has been a faculty member since December 2008. Prof. Tripathy has held significant administrative positions at IIT Patna, including Associate Dean of Academics (January 2016 - March 2017), Head, Computer Centre (November 2022-November 2023) and Associate Dean of Administration (July 2021 - November 2023). His research interests encompass Cybersecurity, Malware Detection, Secure Machine Learning, Lightweight Cryptography, and Blockchain. Tripathy holds two patents and has published over 130 research papers in reputed journals and conferences. He has led several projects as Principal Investigator, notably his team developed a malware detection app presented to the Bureau of Police Research and Development (BPRD) and the Ministry of Home Affairs (MHA) as part of a sponsored project. Tripathy is currently an editor of the IETE Technical Review and an associate editor of the journal Multimedia Tools and Applications. Harsh Kasyap is an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (BHU), Varanasi, India. He is also an honorary research fellow at WMG, University of Warwick, UK. Prior to that, Harsh was a Research Associate, working in the Alan Turing Institute London, where he established significant research collaborations with the HSBC, Bank of Italy and TNO, advancing the fields of data privacy, AI security and fairness. He obtained his Ph.D. from the IIT Patna, India. His Ph.D. thesis title was "Security and Privacy Preserving Techniques for Federated Learning". His research interests are Federated Learning, Machine Learning Security, Trustworthy AI, Privacy and Data Security. Minghong Fang is a tenure-track Assistant Professor in the Department of Computer Science and Engineering at the University of Louisville. He was a Postdoctoral Associate in the Department of Electrical and Computer Engineering at Duke University from 2022 to 2024. He received his Ph.D. degree from the Department of Electrical and Computer Engineering at The Ohio State University in August 2022. He has published several high-impact research papers in top-tier security conferences, including the USENIX Security Symposium, the ACM Conference on Computer and Communications Security (CCS), and the Network and Distributed System Security (NDSS) Symposium. Notably, his USENIX Security 2020 paper was selected as one of the "Normalized Top-100 Security Papers Since 1981". His research interests broadly span various aspects of AI safety and security.
1. Introduction to Machine Learning
a. Types of Learning
b. Learning Tasks
c. Cost Function
d. Optimization
e. Evaluation Metrics
f. Artificial Neural Network
g. Implementation
2. Federated Learning
a. Importance of FL
b. Types of FL
c. Applications in FL
d. Challenges in FL
e. Security and Privacy Issues
f. Defense Techniques
g. Privacy-Preserving Byzantine-Robust FL
h. Implementation
3. Poisoning Attacks in FL
a. Attacker
b. Label flipping attack
c. Gaussian attack
d. LIE attack
e. Krum attack
f. Trim attack
g. Shejwalkar attack
h. Scaling attack
i. Edge attack
j. Vulnerabilities in Cosine Similarity-based Defenses
k. Implementation
4. Inference Attacks in FL
a. Attacker goal
b. Data reconstruction attacks
c. Membership inference attacks
d. Property inference attacks
e. Implementation
5. Byzantine Robust Defenses
a. Design goals
b. Krum
c. Median and Trimmed Mean
d. Bulyan
e. FoolsGold
f. FLTrust
g. Moat
h. DeFL
i. RDFL
j. FLTC
k. Implementation
6. Privacy-Preserving FL
a. Differential Privacy
b. DPFL: A Client Level
c. Homomorphic
d. BatchCrypt: HE-based Scheme
e. Threshold Multi-key HE Scheme
f. Secure Multi-Party Computation
g. Practical Secure Aggregation
h. Summary
i. Implementation
a. Types of Learning
b. Learning Tasks
c. Cost Function
d. Optimization
e. Evaluation Metrics
f. Artificial Neural Network
g. Implementation
2. Federated Learning
a. Importance of FL
b. Types of FL
c. Applications in FL
d. Challenges in FL
e. Security and Privacy Issues
f. Defense Techniques
g. Privacy-Preserving Byzantine-Robust FL
h. Implementation
3. Poisoning Attacks in FL
a. Attacker
b. Label flipping attack
c. Gaussian attack
d. LIE attack
e. Krum attack
f. Trim attack
g. Shejwalkar attack
h. Scaling attack
i. Edge attack
j. Vulnerabilities in Cosine Similarity-based Defenses
k. Implementation
4. Inference Attacks in FL
a. Attacker goal
b. Data reconstruction attacks
c. Membership inference attacks
d. Property inference attacks
e. Implementation
5. Byzantine Robust Defenses
a. Design goals
b. Krum
c. Median and Trimmed Mean
d. Bulyan
e. FoolsGold
f. FLTrust
g. Moat
h. DeFL
i. RDFL
j. FLTC
k. Implementation
6. Privacy-Preserving FL
a. Differential Privacy
b. DPFL: A Client Level
c. Homomorphic
d. BatchCrypt: HE-based Scheme
e. Threshold Multi-key HE Scheme
f. Secure Multi-Party Computation
g. Practical Secure Aggregation
h. Summary
i. Implementation
1. Introduction to Machine Learning
a. Types of Learning
b. Learning Tasks
c. Cost Function
d. Optimization
e. Evaluation Metrics
f. Artificial Neural Network
g. Implementation
2. Federated Learning
a. Importance of FL
b. Types of FL
c. Applications in FL
d. Challenges in FL
e. Security and Privacy Issues
f. Defense Techniques
g. Privacy-Preserving Byzantine-Robust FL
h. Implementation
3. Poisoning Attacks in FL
a. Attacker
b. Label flipping attack
c. Gaussian attack
d. LIE attack
e. Krum attack
f. Trim attack
g. Shejwalkar attack
h. Scaling attack
i. Edge attack
j. Vulnerabilities in Cosine Similarity-based Defenses
k. Implementation
4. Inference Attacks in FL
a. Attacker goal
b. Data reconstruction attacks
c. Membership inference attacks
d. Property inference attacks
e. Implementation
5. Byzantine Robust Defenses
a. Design goals
b. Krum
c. Median and Trimmed Mean
d. Bulyan
e. FoolsGold
f. FLTrust
g. Moat
h. DeFL
i. RDFL
j. FLTC
k. Implementation
6. Privacy-Preserving FL
a. Differential Privacy
b. DPFL: A Client Level
c. Homomorphic
d. BatchCrypt: HE-based Scheme
e. Threshold Multi-key HE Scheme
f. Secure Multi-Party Computation
g. Practical Secure Aggregation
h. Summary
i. Implementation
a. Types of Learning
b. Learning Tasks
c. Cost Function
d. Optimization
e. Evaluation Metrics
f. Artificial Neural Network
g. Implementation
2. Federated Learning
a. Importance of FL
b. Types of FL
c. Applications in FL
d. Challenges in FL
e. Security and Privacy Issues
f. Defense Techniques
g. Privacy-Preserving Byzantine-Robust FL
h. Implementation
3. Poisoning Attacks in FL
a. Attacker
b. Label flipping attack
c. Gaussian attack
d. LIE attack
e. Krum attack
f. Trim attack
g. Shejwalkar attack
h. Scaling attack
i. Edge attack
j. Vulnerabilities in Cosine Similarity-based Defenses
k. Implementation
4. Inference Attacks in FL
a. Attacker goal
b. Data reconstruction attacks
c. Membership inference attacks
d. Property inference attacks
e. Implementation
5. Byzantine Robust Defenses
a. Design goals
b. Krum
c. Median and Trimmed Mean
d. Bulyan
e. FoolsGold
f. FLTrust
g. Moat
h. DeFL
i. RDFL
j. FLTC
k. Implementation
6. Privacy-Preserving FL
a. Differential Privacy
b. DPFL: A Client Level
c. Homomorphic
d. BatchCrypt: HE-based Scheme
e. Threshold Multi-key HE Scheme
f. Secure Multi-Party Computation
g. Practical Secure Aggregation
h. Summary
i. Implementation







