000 | 03364cam a2200649 i 4500 | ||
---|---|---|---|
001 | on1300754914 | ||
003 | OCoLC | ||
005 | 20240611145155.0 | ||
006 | m d | ||
007 | cr cnu---unuuu | ||
008 | 220219s2022 mdua ob 001 0 eng | ||
010 | _a 2021062447 | ||
040 |
_aDLC _beng _erda _cDLC _dOCLCO _dOCLCF _dOCLCO _dYDX _dN$T |
||
019 | _a1299174290 | ||
020 |
_a1538155095 _qelectronic book |
||
020 |
_a9781538155097 _q(electronic bk.) |
||
020 |
_z9781538155080 _qhardcover |
||
035 |
_a3241754 _b(N$T) |
||
035 |
_a(OCoLC)1300754914 _z(OCoLC)1299174290 |
||
042 | _apcc | ||
050 | 0 | 4 |
_aQ335 _b.G53 2022 |
082 | 0 | 0 |
_a006.3 _223/eng20220223 |
049 | _aMAIN | ||
100 | 1 |
_aGibian, Davey, _d1988- _eauthor. |
|
245 | 1 | 0 |
_aHacking artificial intelligence : _ba leader's guide from deepfakes to breaking deep learning / _cDavey Gibian. |
264 | 1 |
_aLanham : _bRowman & Littlefield, _c[2022] |
|
300 |
_a1 online resource (ix, 179 pages) : _billustrations (some color) |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction: Hacking facial recognition -- A brief overview of artificial intelligence -- How AI is different from traditional software -- Data bias -- Hacking AI systems -- Evasion attacks -- Data poisoning -- Model inversion ("privacy") attacks -- Obfuscation attacks -- Talking to AI : model interpretability -- Machine vs. machine -- Will someone hack my AI? -- The machine told us to do it. | |
520 |
_a"The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. This book sheds light on the many hacking risks, encouraging readers to address problems before they become catastrophic"-- _cProvided by publisher. |
||
588 | _aDescription based on online resource; title from digital title page (viewed on May 18, 2022). | ||
590 | _aAdded to collection customer.56279.3 | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 |
_aInformation storage and retrieval systems _xRisk management. |
|
650 | 0 |
_aInformation technology _xManagement. |
|
650 | 0 | _aData privacy. | |
650 | 0 | _aData protection. | |
650 | 2 | _aArtificial Intelligence | |
650 | 6 | _aIntelligence artificielle. | |
650 | 6 |
_aSystèmes d'information _xGestion du risque. |
|
650 | 6 |
_aTechnologie de l'information _xGestion. |
|
650 | 6 | _aProtection de l'information (Informatique) | |
650 | 7 |
_aartificial intelligence. _2aat |
|
650 | 7 |
_aArtificial intelligence. _2fast _0(OCoLC)fst00817247 |
|
650 | 7 |
_aData privacy. _2fast _0(OCoLC)fst02032662 |
|
650 | 7 |
_aData protection. _2fast _0(OCoLC)fst00887958 |
|
650 | 7 |
_aInformation storage and retrieval systems _xRisk management. _2fast _0(OCoLC)fst02026826 |
|
650 | 7 |
_aInformation technology _xManagement. _2fast _0(OCoLC)fst00973112 |
|
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aGibian, Davey, 1988- _tHacking artificial intelligence _dLanham : Rowman & Littlefield, [2022] _z9781538155080 _w(DLC) 2021062446 |
856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3241754 |
938 |
_aEBSCOhost _bEBSC _n3241754 |
||
994 |
_a92 _bN$T |
||
999 |
_c257186 _d257186 |