Get Free Shipping on orders over $79
Adversarial Example Detection and Mitigation Using Machine Learning : Computer Science (R0) - Ehsan Nowroozi

Adversarial Example Detection and Mitigation Using Machine Learning

By: Ehsan Nowroozi (Editor), Rahim Taheri (Editor), Lucas Cordeiro (Editor)

eText | 21 January 2026

At a Glance

eText


$249.00

or 4 interest-free payments of $62.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book offers a comprehensive exploration of the emerging threats and defense strategies in adversarial machine learning and AI security. It covers a broad range of topics, from federated learning attacks, adversarial defenses, biometric vulnerabilities, and security weaknesses in generative AI to quantum threats and ethical considerations. It also brings together leading researchers to provide an in-depth and multifaceted perspective.

As artificial intelligence systems become increasingly integrated into critical sectors such as healthcare, finance, transportation, and national security, understanding and mitigating adversarial risks has never been more crucial. Each chapter delivers not only a detailed analysis of current challenges, but it also includes insights into practical mitigation techniques, future trends, and real-world applications.

This book is intended for researchers and graduate students working in machine learning, cybersecurity, and related disciplines. Security professionals will also find this book to be a valuable reference for understanding the latest advancements, defending against sophisticated adversarial threats, and contributing to the development of more robust, trustworthy AI systems. By bridging theoretical foundations with practical applications, this book serves as both a scholarly reference and a catalyst for innovation in the rapidly evolving field of AI security.

on
Desktop
Tablet
Mobile

More in Artificial Intelligence

AI-Powered Search - Trey Grainger

eBOOK

AI : The End of Human Race - Alex Wood

eBOOK