Mostrando 5,761 - 5,780 Resultados de 6,164 Para Buscar '"White"', tiempo de consulta: 0.15s Limitar resultados
  1. 5761
    por Qiu, Robert Caiming, 1966-
    Publicado 2012
    Tabla de Contenidos: “…-- Preface xv -- 1 Introduction 1 -- 1.1 Vision: “Big Data” 1 -- 1.2 Cognitive Radio: System Concepts 2 -- 1.3 Spectrum Sensing Interface and Data Structures 2 -- 1.4 Mathematical Machinery 4 -- 1.4.1 Convex Optimization 4 -- 1.4.2 Game Theory 6 -- 1.4.3 “Big Data” Modeled as Large Random Matrices 6 -- 1.5 Sample Covariance Matrix 10 -- 1.6 Large Sample Covariance Matrices of Spiked Population Models 11 -- 1.7 Random Matrices and Noncommutative Random Variables 12 -- 1.8 Principal Component Analysis 13 -- 1.9 Generalized Likelihood Ratio Test (GLRT) 13 -- 1.10 Bregman Divergence for Matrix Nearness 13 -- 2 Spectrum Sensing: Basic Techniques 15 -- 2.1 Challenges 15 -- 2.2 Energy Detection: No Prior Information about Deterministic or Stochastic Signal 15 -- 2.2.1 Detection in White Noise: Lowpass Case 16 -- 2.2.2 Time-Domain Representation of the Decision Statistic 19 -- 2.2.3 Spectral Representation of the Decision Statistic 19 -- 2.2.4 Detection and False Alarm Probabilities over AWGN Channels 20 -- 2.2.5 Expansion of Random Process in Orthonormal Series with Uncorrelated Coefficients: The Karhunen-Loeve Expansion 21 -- 2.3 Spectrum Sensing Exploiting Second-Order Statistics 23 -- 2.3.1 Signal Detection Formulation 23 -- 2.3.2 Wide-Sense Stationary Stochastic Process: Continuous-Time 24 -- 2.3.3 Nonstationary Stochastic Process: Continuous-Time 25 -- 2.3.4 Spectrum Correlation-Based Spectrum Sensing for WSS Stochastic Signal: Heuristic Approach 29 -- 2.3.5 Likelihood Ratio Test of Discrete-Time WSS Stochastic Signal 32 -- 2.3.6 Asymptotic Equivalence between Spectrum Correlation and Likelihood Ratio Test 35 -- 2.3.7 Likelihood Ratio Test of Continuous-Time Stochastic Signals in Noise: Selin's Approach 36 -- 2.4 Statistical Pattern Recognition: Exploiting Prior Information about Signal through Machine Learning 39 -- 2.4.1 Karhunen-Loeve Decomposition for Continuous-Time Stochastic Signal 39 -- 2.5 Feature Template Matching 42 -- 2.6 Cyclostationary Detection 47 -- 3 Classical Detection 51.…”
    Libro electrónico
  2. 5762
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
    Libro electrónico
  3. 5763
    Publicado 2018
    Tabla de Contenidos: “…Security Configuration Management - Discovery and Detection -- Security Configuration Management - Risk Mitigation -- Security Configuration Management - Security State Analysis -- Security Configuration Management - Data Exposure and Sharing -- Prelude - integrating like services -- Integrating cyber intel from different services -- Overview - red team methodology -- Red team - testing methods -- White box -- Gray box -- Black box -- Red team constraints -- Red team - graphical representation -- Data integration challenges -- The end user perspective -- The service level perspective - cyber intelligence - Data Exposure and Sharing -- The SOC perspective -- Capability Maturity Model - InfoSec and cyber intel -- Capability Maturity Model - InfoSec and cyber intel - initial phase -- Capability Maturity Model - InfoSec and cyber intel - Phase A -- Capability Maturity Model - InfoSec and cyber intel - Phase B -- Capability Maturity Model - InfoSec and cyber intel - Phase C -- Collaboration + Capability = Active Defense -- Summary -- Chapter 9: Driving Cyber Intel -- The gap -- Another set of eyes -- The logic -- Event -- Incident -- Mapping events and incidents to InfoSec capabilities -- Capability Maturity Model - security awareness -- Capability Maturity Model - security awareness Phase - Initial -- Capability Maturity Model - security awareness - Phase A -- Capability Maturity Model - security awareness - Phase B -- Capability Maturity Model - security awareness - Phase C -- Capability Maturity Model - security awareness - Phase C + -- Just another day part 1 -- Summary -- Chapter 10: Baselines and Anomalies -- Setting up camp -- Baselines and anomalies -- Continuous monitoring - the challenge -- Part 1 -- Part 2 -- Part 3 -- Capability Maturity Model - continuous monitoring overview -- Level 1 - phase A -- Level 1 - phase B -- Level 1 - phase C.…”
    Libro electrónico
  4. 5764
    Publicado 2018
    Tabla de Contenidos: “…-- Understanding TDD -- Red-Green-Refactor -- Speed is the key -- It's not about testing -- Testing -- Black-box testing -- White-box testing -- The difference between quality checking and quality assurance -- Better tests -- Mocking -- Executable documentation -- No debugging -- Summary -- Chapter 2: Tools, Frameworks, and Environments -- Git -- Virtual machines -- Vagrant -- Docker -- Build tools -- The integrated development environment -- The IDEA demo project -- Unit-testing frameworks -- JUnit -- TestNG -- Hamcrest and AssertJ -- Hamcrest -- AssertJ -- Code coverage tools -- JaCoCo -- Mocking frameworks -- Mockito -- EasyMock -- Extra power for mocks -- User interface testing -- Web-testing frameworks -- Selenium -- Selenide -- Behavior-driven development -- JBehave -- Cucumber -- Summary -- Chapter 3: Red-Green-Refactor - From Failure Through Success until Perfection -- Setting up the environment with Gradle and JUnit -- Setting up Gradle/Java project in IntelliJ IDEA -- The Red-Green-Refactor process -- Writing a test -- Running all the tests and confirming that the last one is failing -- Writing the implementation code -- Running all the tests -- Refactoring -- Repeating -- Tic-Tac-Toe game requirements -- Developing Tic-Tac-Toe -- Requirement 1 - placing pieces -- Test - board boundaries I -- Implementation -- Test - board boundaries II -- Implementation -- Test - occupied spot -- Implementation -- Refactoring -- Requirement 2 - adding two-player support -- Test - X plays first -- Implementation -- Test - O plays right after X -- Implementation -- Test - X plays right after O -- Requirement 3 - adding winning conditions -- Test - by default there's no winner…”
    Libro electrónico
  5. 5765
    Publicado 2004
    Libro electrónico
  6. 5766
    Publicado 2017
    Tabla de Contenidos: “…Testability - Writing Testable Code -- Understanding testability -- Software testability and related attributes -- Testability - architectural aspects -- Testability - strategies -- Reduce system complexity -- Improving predictability -- Control and isolate external dependencies -- White-box testing principles -- Unit testing -- Unit testing in action -- Extending our unit test case -- Nosing around with nose2 -- Testing with py.test -- Code coverage -- Measuring coverage using coverage.py -- Measuring coverage using nose2 -- Measuring coverage using py.test -- Mocking things up -- Tests inline in documentation - doctests -- Integration tests -- Test automation -- Test automation using Selenium Web Driver -- Test-Driven Development -- TDD with palindromes -- Summary -- 4. …”
    Libro electrónico
  7. 5767
    Publicado 2019
    Tabla de Contenidos: “…Eye detection using haarcascade_lefteye_2splits and haarcascade_righteye_2splits -- Detecting the left eye -- Detecting the right eye -- Recognizing a smile -- Programming logic for smile recognition -- Face-tracking robot -- Wiring connections -- The programming logic -- Using the white dot on the face triangle to move the robot -- Summary -- Questions -- Section 4: Smartphone-Controlled Robot -- Chapter 9: Building a Voice-Controlled Robot -- Technical requirements -- An introduction to App Inventor -- Creating a Talking Pi Android app -- Designing the app -- Programming the blocks -- Main block -- Intermediate block -- Final block -- The Talking Pi program -- Importing and exporting the .aia file of the app -- Creating a voice-controlled bot app -- Designing the app -- Adding and customizing the components -- Programming the voice-controlled bot block -- Pairing the Android smartphone and RPi via Bluetooth -- Enabling the Bluetooth serial port -- Developing the Bluetooth program for RPi -- Socket programming -- VoiceBot server program -- Testing the code -- Summary -- Questions -- Assessments -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  8. 5768
    Publicado 2019
    Tabla de Contenidos: “…Reducing the problem to statistics -- Understanding that deep learning doesn't create -- Mimicking an Artist -- Defining a new piece based on a single artist -- Combining styles to create new art -- Visualizing how neural networks dream -- Using a network to compose music -- Chapter 16 Building Generative Adversarial Networks -- Making Networks Compete -- Finding the key in the competition -- Achieving more realistic results -- Considering a Growing Field -- Inventing realistic pictures of celebrities -- Enhancing details and image translation -- Chapter 17 Playing with Deep Reinforcement Learning -- Playing a Game with Neural Networks -- Introducing reinforcement learning -- Simulating game environments -- Presenting Q-learning -- Explaining Alpha-Go -- Determining if you're going to win -- Applying self-learning at scale -- Part 4 The Part of Tens -- Chapter 18 Ten Applications that Require Deep Learning -- Restoring Color to Black-and-White Videos and Pictures -- Approximating Person Poses in Real Time -- Performing Real-Time Behavior Analysis -- Translating Languages -- Estimating Solar Savings Potential -- Beating People at Computer Games -- Generating Voices -- Predicting Demographics -- Creating Art from Real-World Pictures -- Forecasting Natural Catastrophes -- Chapter 19 Ten Must-Have Deep Learning Tools -- Compiling Math Expressions Using Theano -- Augmenting TensorFlow Using Keras -- Dynamically Computing Graphs with Chainer -- Creating a MATLAB-Like Environment with Torch -- Performing Tasks Dynamically with PyTorch -- Accelerating Deep Learning Research Using CUDA -- Supporting Business Needs with Deeplearning4j -- Mining Data Using Neural Designer -- Training Algorithms Using Microsoft Cognitive Toolkit (CNTK) -- Exploiting Full GPU Capability Using MXNet -- Chapter 20 Ten Types of Occupations that Use Deep Learning -- Managing People…”
    Libro electrónico
  9. 5769
    Publicado 2016
    Tabla de Contenidos: “…Make the Game's Ending -- 13. Create the White Fade Out Sprite -- Version 2.0: High Score -- Cheat Mode: Recover Health -- Summary -- Review Questions -- Chapter 8: Asteroid Breaker . . . in Space! …”
    Libro electrónico
  10. 5770
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- 1: Financial Data and Their Properties -- 1.1 Asset Returns -- 1.2 Bond Yields and Prices -- 1.3 Implied Volatility -- 1.4 R Packages and Demonstrations -- 1.4.1 Installation of R Packages -- 1.4.2 The Quantmod Package -- 1.4.3 Some Basic R Commands -- 1.5 Examples of Financial Data -- 1.6 Distributional Properties of Returns -- 1.6.1 Review of Statistical Distributions and Their Moments -- 1.7 Visualization of Financial Data -- 1.8 Some Statistical Distributions -- 1.8.1 Normal Distribution -- 1.8.2 Lognormal Distribution -- 1.8.3 Stable Distribution -- 1.8.4 Scale Mixture of Normal Distributions -- 1.8.5 Multivariate Returns -- Exercises -- References -- 2: Linear Models for Financial Time Series -- 2.1 Stationarity -- 2.2 Correlation and Autocorrelation Function -- 2.3 White Noise and Linear Time Series -- 2.4 Simple Autoregressive Models -- 2.4.1 Properties of AR Models -- 2.4.2 Identifying Ar Models in Practice -- 2.4.3 Goodness of Fit -- 2.4.4 Forecasting -- 2.5 Simple Moving Average Models -- 2.5.1 Properties of MA Models -- 2.5.2 Identifying MA Order -- 2.5.3 Estimation -- 2.5.4 Forecasting Using MA Models -- 2.6 Simple Arma Models -- 2.6.1 Properties of ARMA(1,1) Models -- 2.6.2 General ARMA Models -- 2.6.3 Identifying ARMA Models -- 2.6.4 Forecasting Using an ARMA Model -- 2.6.5 Three Model Representations for an ARMA Model -- 2.7 Unit-root Nonstationarity -- 2.7.1 Random Walk -- 2.7.2 Random Walk with Drift -- 2.7.3 Trend-stationary Time Series -- 2.7.4 General Unit-root Nonstationary Models -- 2.7.5 Unit-root Test -- 2.8 Exponential Smoothing -- 2.9 Seasonal Models -- 2.9.1 Seasonal Differencing -- 2.9.2 Multiplicative Seasonal Models -- 2.9.3 Seasonal Dummy Variable -- 2.10 Regression Models with Time Series Errors -- 2.11 Long-memory Models…”
    Libro electrónico
  11. 5771
    Publicado 2014
    Seriada digital
  12. 5772
    Publicado 2017
    Tabla de Contenidos: “…Heckel (Peanut Tree, Essessang, or Nyangsang) -- Chrysophyllum albidum G. Don (White or African Star-apple) -- Garcinia kola Heckel and Related Species (Bitter Cola) -- Semi-Arid Lowlands of West Africa -- Adansonia digitata Linn. …”
    Libro electrónico
  13. 5773
    Publicado 2017
    Tabla de Contenidos: “…-- Compliance -- Hackers and hacking -- Black hat hacker -- White hat or ethical hacker -- Blue hat hacker -- Grey hat hacker -- Penetration testing -- Hacktivist -- Script kiddie -- Nation state -- Cybercrime -- Methods used by the attacker -- Exploits -- Hacker techniques -- Methods of conducting training and awareness -- Closing information system vulnerabilities -- Vulnerability management -- The case for vulnerability management -- Summary -- Chapter 3: Preparing for Information and Data Security -- Establishing an information security program -- Don't start from scratch, use a framework -- Security program success factors -- Executive or board support -- Supporting the organization's mission -- Rightsizing information security for the organization -- Security awareness and training program -- Information security built into SDLC -- Information security program maturity -- Information security policies -- Information security program policy -- Operational policy -- System-specific policy -- Standards -- Procedures -- Guidelines -- Recommended operational policies -- Planning policy -- Access control policy -- Awareness and training policy…”
    Libro electrónico
  14. 5774
    Publicado 2023
    Tabla de Contenidos: “…Integration Testing -- Regression Testing -- Automated Testing -- Component Interface Testing -- System Testing -- Acceptance Testing -- Other Testing Categories -- Testing Techniques -- Exhaustive Testing -- Black-Box Testing -- White-Box Testing -- Gray-Box Testing -- Testing Habits -- Test and Debug When Alert -- Test Your Own Code -- Have Someone Else Test Your Code -- Fix Your Own Bugs -- Think Before You Change -- Don't Believe in Magic -- See What Changed -- Fix Bugs, Not Symptoms -- Test Your Tests -- How to Fix a Bug -- Estimating Number of Bugs -- Tracking Bugs Found -- Seeding -- The Lincoln Index -- Summary -- What You Learned in This Chapter -- Chapter 14 Deployment -- Scope -- The Plan -- Cutover -- Staged Deployment -- Gradual Cutover -- Incremental Deployment -- Parallel Testing -- Deployment Tasks -- Deployment Mistakes -- Summary -- What You Learned in This Chapter -- Chapter 15 Metrics -- Wrap Party -- Defect Analysis -- Species of Bugs -- Discoverer -- Severity -- Creation Time -- Age at Fix -- Task Type -- Defect Database -- Ishikawa Diagrams -- Software Metrics -- Qualities of Good Attributes and Metrics -- Using Metrics -- Process Metrics -- Project Metrics -- Things to Measure -- Size Normalization -- Function Point Normalization -- Count Function Point Metrics -- Multiply by Complexity Factors -- Calculate Complexity Adjustment Value -- Calculate Adjusted FP -- Summary -- What You Learned in This Chapter -- Chapter 16 Maintenance -- Maintenance Costs -- Task Categories -- Perfective Tasks -- Feature Improvements -- New Features -- The Second System Effect -- Adaptive Tasks -- Corrective Tasks -- Preventive Tasks -- Clarification -- Code Reuse -- Improved Flexibility -- Bug Swarms -- Bad Programming Practices -- Individual Bugs -- Not Invented Here -- Task Execution -- Summary -- What You Learned in This Chapter…”
    Libro electrónico
  15. 5775
    Publicado 2013
    Tabla de Contenidos: “…Protecting Intellectual Property -- Section 6.1 Triage: Assessing Business Needs -- Process Mapping of Analytics Needs -- Innovation: Identifying New Killer Apps -- Scrutinizing the Inventory -- Assigning Rigor and Deducing Resources -- Section 6.2 Evaluating Analytics Prowess: The White-Glove Treatment -- Leading and Organizing -- Progress in Acculturating Analytics -- Evaluating Decision-Making Capabilities -- Evaluating Technical Coverage -- Executing Best Statistical Practice -- Constructing Effective Building Blocks -- Business Analytics Maturity Model -- Section 6.3 Innovation and Change from a Producer on the Edge -- Emphasis on Speed -- Continual Improvement15 -- Accelerating the Offense-For Those Who Are Struggling -- Notes -- Part II The Three Pillars of Best Statistical Practice -- Blind Man's Russian Roulette Bluff -- 7 Statistical Qualifications -- Section 7.1 Leadership and Communications for Analytics Professionals -- Leadership -- Communication -- Leadership and Communication Training -- Section 7.2 Training for Making Analytics-Based Decisions -- Statistical "Mythodologies" -- Section 7.3: Statistical Training for Performing Advanced Analytics14 -- The Benefi ts of Training -- Academic Training23 -- Post-Academic Training-Best Statistical Practice -- Training Through Review -- Section 7.4 Certifi cation for Analytics Professionals -- The PSTAT® (ASA) (Professional Statistician)-ASA's New Accreditation by Ronald L. …”
    Libro electrónico
  16. 5776
    Publicado 2011
    Tabla de Contenidos: “…Isolation of metal from concentrated ore -- Thermal (or chemical reduction) -- Auto reduction -- Electrolytic method of reduction -- Displacement of one metal by the other -- Purification of isolated metals -- Sodium -- Magnesium -- Calcium -- Aluminium -- Iron -- Ashoka Pillar at Delhi -- Pig iron -- Grey cast iron -- White cast iron -- Wrought iron -- Steel -- Special steel -- Conversion of iron into Steel -- Steel from wrought iron -- Comparison Pig iron, Wrought and Steel -- Heat treatments of steel -- Chemically pure iron -- Brief chemistry of iron -- Corrosion of iron -- Important compounds of iron -- Copper -- Alloys of copper -- Brief chemistry of Cu -- Important compounds and complexes -- Zinc -- Brief chemistry of Zn -- Important compounds -- Mercury -- Brief chemistry of Hg -- Important compounds -- Tin -- Allotropic forms -- Chemical reactions -- Lead -- Physical properties -- Important compounds -- Chapter 8: Important Chemical Compounds -- Metal compounds -- Methods of Manufacturing of NaOH -- Sodium Carbonate (Na2CO3) -- Potassium Dichromate (K2Cr2O7) -- KMnO4 as volumetric reagent -- Non-metal compounds -- Ozone (O3) [Trioxygen] -- Hydrogen peroxide (H2O2 ) -- Sodium Thiosulphate (Na2S2O3) -- Hydrogen sulphide (H2S) -- Chapter 9: Hydrogen and Its Chemistry -- Position in the periodic table -- Isotopes of Hydrogen -- Oxidation states and bonding -- Preparation of H2 -- Uyeno's reaction -- Bosch's Process -- Lane's Process -- Laboratory Preparation of H2 -- Nascent hydrogen -- Compounds of protium (H) -- Water -- Zeolite water -- Water clathrates -- Hard and soft water -- Temporary hardness -- Permanent hardness -- Inorganic exchangers -- Organic exchangers -- Bad effects of hard water -- Structure of water and ice -- Density of water and ice -- Density of water at 4°C -- Heavy water -- Chapter 10: Group - 1(IA) The alkali metals…”
    Libro electrónico
  17. 5777
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Introduction -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- Information technology security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Information security policies -- Information security training -- Summary -- Chapter 2: Defining the Threat Landscape -- Understanding the organizational context -- Threats -- Phishing attacks -- Ransomware -- Malware -- Distributed denial-of-service attacks -- Insider threats -- Advanced Persistent Threats -- Social engineering attacks -- Supply chain attacks -- Hackers and hacking -- White hat/ethical hacker -- Black hat hacker -- Gray hat hacker -- Blue hat hacker -- Script kiddie -- Hacktivist -- Nation-state attacker -- Penetration testing -- Cybercrime -- Exploits -- Hacker techniques -- Closing information system vulnerabilities -- Vulnerability management -- Summary -- Chapter 3: Laying a Foundation for Information and Data Security -- Developing a comprehensive information security program -- Leveraging existing frameworks instead of building from scratch -- Essential factors for information security program success -- Aligning information security with the organization's mission -- Optimizing information security measures for your organization -- Enhancing security through comprehensive awareness and training programs -- Building information security into the SDLC/SELC process -- Understanding and enhancing your information security program maturity -- Information security policies -- Information security program policy -- Enterprise information security policies…”
    Libro electrónico
  18. 5778
    Publicado 2024
    Tabla de Contenidos: “…-- Motive -- Means -- Opportunity -- Types and profiles of attackers and defenders -- Black hat hackers -- Script kiddies -- Hacktivists -- Cyber terrorists/cyber warriors -- Cyber criminals -- White hat hackers -- Attack targets and types -- Network -- Application -- Host -- The anatomy of an attack -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and control -- Actions on objectives -- Ethical hacking and penetration testing -- Defensive technologies -- Lab - setting up the testing lab -- Setting up VirtualBox -- Setting up Kali Linux -- Setting up vulnerable hosts -- Configuring the vulnerable Windows host -- Setting up the vulnerable Linux host -- Final checks -- Summary -- Assessment -- Answers -- Chapter 2: Ethical Hacking Footprinting and Reconnaissance -- Technical requirements -- What is footprinting and reconnaissance? …”
    Libro electrónico
  19. 5779
    Publicado 2018
    Tabla de Contenidos: “…-- 7.8.4 Constrained LS Estimation -- 7.9 Robust Estimation -- Chapter 8 Cramér-Rao Bound -- 8.1 Cramér-Rao Bound and Fisher Information Matrix -- 8.1.1 CRB for Scalar Problem (P=1) -- 8.1.2 CRB and Local Curvature of Log-Likelihood -- 8.1.3 CRB for Multiple Parameters (p≥1) -- 8.2 Interpretation of CRB and Remarks -- 8.2.1 Variance of Each Parameter -- 8.2.2 Compactness of the Estimates -- 8.2.3 FIM for Known Parameters -- 8.2.4 Approximation of the Inverse of FIM -- 8.2.5 Estimation Decoupled From FIM -- 8.2.6 CRB and Nuisance Parameters -- 8.2.7 CRB for Non-Gaussian rv and Gaussian Bound -- 8.3 CRB and Variable Transformations -- 8.4 FIM for Gaussian Parametric Model xN(μ(θ),C(θ)) -- 8.4.1 FIM for x=s(θ)+w with wN(0,Cw) -- 8.4.2 FIM for Continuous-Time Signals in Additive White Gaussian Noise -- 8.4.3 FIM for Circular Complex Model -- Appendix A: Proof of CRB -- Appendix B: FIM for GaussianModel -- Appendix C: Some Derivatives for MLE and CRB Computations…”
    Libro electrónico
  20. 5780
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Editors -- Contributors -- Part I Secure AI/ML Systems: Attack Models -- 1 Machine Learning Attack Models -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Notation -- 1.2.2 Support Vector Machines -- 1.2.3 Neural Networks -- 1.3 White-Box Adversarial Attacks -- 1.3.1 L-BGFS Attack -- 1.3.2 Fast Gradient Sign Method -- 1.3.3 Basic Iterative Method -- 1.3.4 DeepFool -- 1.3.5 Fast Adaptive Boundary Attack -- 1.3.6 Carlini and Wagner's Attack -- 1.3.7 Shadow Attack -- 1.3.8 Wasserstein Attack -- 1.4 Black-Box Adversarial Attacks -- 1.4.1 Transfer Attack -- 1.4.2 Score-Based Black-Box Attacks -- ZOO Attack -- Square Attack -- 1.4.3 Decision-Based Attack -- Boundary Attack -- HopSkipJump Attack -- Spatial Transformation Attack -- 1.5 Data Poisoning Attacks -- 1.5.1 Label Flipping Attacks -- 1.5.2 Clean Label Data Poisoning Attack -- Feature Collision Attack -- Convex Polytope Attack and Bullseye Polytope Attack -- 1.5.3 Backdoor Attack -- 1.6 Conclusions -- Acknowledgment -- Note -- References -- 2 Adversarial Machine Learning: A New Threat Paradigm for Next-Generation Wireless Communications -- 2.1 Introduction -- 2.1.1 Scope and Background -- 2.2 Adversarial Machine Learning -- 2.3 Challenges and Gaps -- 2.3.1 Development Environment -- 2.3.2 Training and Test Datasets -- 2.3.3 Repeatability, Hyperparameter Optimization, and Explainability -- 2.3.4 Embedded Implementation -- 2.4 Conclusions and Recommendations -- References -- 3 Threat of Adversarial Attacks to Deep Learning: A Survey -- 3.1 Introduction -- 3.2 Categories of Attacks -- 3.2.1 White-Box Attacks -- FGSM-based Method -- JSMA-based Method -- 3.2.2 Black-Box Attacks -- Mobility-based Approach -- Gradient Estimation-Based Approach -- 3.3 Attacks Overview…”
    Libro electrónico