Hacking artificial intelligence a leader's guide from deepfakes to breaking deep learning

"The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. This book sheds light on the many hacking risks, encouraging readers to address problems before they become catastrophic"...

Full description

Bibliographic Details
Main Author: Gibian, Davey, 1988-
Format: eBook
Language:English
Published: Lanham Rowman & Littlefield, [2022]
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03090cam a2200601 i 4500
001 koha001013734
003 OCoLC
005 20250222070010.0
006 m d
007 cr cnu---unuuu
008 220219s2022 mdua ob 001 0 eng
010 |a  2021062447 
035 |a koha001013734 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d OCLCF  |d OCLCO  |d YDX  |d N$T 
019 |a 1299174290 
020 |a 1538155095  |q electronic book 
020 |a 9781538155097  |q (electronic bk.) 
020 |z 9781538155080  |q hardcover 
042 |a pcc 
050 0 4 |a Q335  |b .G53 2022 
082 0 0 |a 006.3  |2 23/eng20220223 
049 |a MAIN 
100 1 |a Gibian, Davey,  |d 1988-  |9 912378 
245 1 0 |a Hacking artificial intelligence  |b a leader's guide from deepfakes to breaking deep learning  |c Davey Gibian. 
264 1 |a Lanham  |b Rowman & Littlefield,  |c [2022] 
300 |a 1 online resource (ix, 179 pages)  |b illustrations (some color) 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction: Hacking facial recognition -- A brief overview of artificial intelligence -- How AI is different from traditional software -- Data bias -- Hacking AI systems -- Evasion attacks -- Data poisoning -- Model inversion ("privacy") attacks -- Obfuscation attacks -- Talking to AI : model interpretability -- Machine vs. machine -- Will someone hack my AI? -- The machine told us to do it. 
520 |a "The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. This book sheds light on the many hacking risks, encouraging readers to address problems before they become catastrophic"--  |c Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on May 18, 2022). 
653 0 |a Artificial intelligence. 
653 0 |a Information storage and retrieval systems  |x Risk management. 
653 0 |a Information technology  |x Management. 
653 0 |a Data privacy. 
653 0 |a Data protection. 
653 2 |a Artificial Intelligence 
653 6 |a Intelligence artificielle. 
653 6 |a Systèmes d'information  |x Gestion du risque. 
653 6 |a Technologie de l'information  |x Gestion. 
653 6 |a Protection de l'information (Informatique) 
653 7 |a artificial intelligence.  |2 aat 
653 7 |a Artificial intelligence.  |2 fast  |0 (OCoLC)fst00817247 
653 7 |a Data privacy.  |2 fast  |0 (OCoLC)fst02032662 
653 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
653 7 |a Information storage and retrieval systems  |x Risk management.  |2 fast  |0 (OCoLC)fst02026826 
653 7 |a Information technology  |x Management.  |2 fast  |0 (OCoLC)fst00973112 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/3241754.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013734 
910 |a EBSCO eBooks 
999 |c 1013734  |d 1013734 
039