Please use this identifier to cite or link to this item: https://openlibrary-repo.ecampusontario.ca/jspui/handle/123456789/2446
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMaaroof, Bestan-
dc.date.accessioned2025-11-18T21:12:13Z-
dc.date.available2025-11-18T21:12:13Z-
dc.date.issued2025-
dc.identifierc579cdd2-a99e-4fa2-b67a-2e4a78914428-
dc.identifier.urihttps://openlibrary-repo.ecampusontario.ca/jspui/handle/123456789/2446-
dc.description.tableofcontentsChapter 1: Introduction to Machine Learning Security and Challengesen_US
dc.description.tableofcontentsChapter 2: Threat Modellingen_US
dc.description.tableofcontentsChapter 3: Evasion Attack (Adversarial Examples)en_US
dc.description.tableofcontentsChapter 4: Poisoning Attack and Mitigationsen_US
dc.description.tableofcontentsChapter 5: Backdoor Attacksen_US
dc.description.tableofcontentsChapter 6: Privacy Attacken_US
dc.language.isoengen_US
dc.publisherFanshawe Collegeen_US
dc.relation.isformatofhttps://ecampusontario.pressbooks.pub/securemachinelearning/en_US
dc.rightsCC BY-NC-SA | https://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.titleWinning the battle for secure MLen_US
dc.typeBooken_US
dcterms.accessRightsOpen Accessen_US
dcterms.educationLevelCollegeen_US
dcterms.educationLevelUniversity - Undergraduateen_US
dc.identifier.slughttps://openlibrary.ecampusontario.ca/catalogue/item/?id=c579cdd2-a99e-4fa2-b67a-2e4a78914428-
ecO-OER.AdoptedNoen_US
ecO-OER.AncillaryMaterialNoen_US
ecO-OER.InstitutionalAffiliationFanshawe Collegeen_US
ecO-OER.ISNI0000 0001 0487 5961en_US
ecO-OER.ReviewedNoen_US
ecO-OER.AccessibilityStatementYesen_US
ecO-OER.AccessibilityURIhttps://ecampusontario.pressbooks.pub/securemachinelearning/front-matter/about-this-book/-
ecO-OER.CourseTitleFanshawe College, Machine Learning Security (INFO-6149)en_US
lrmi.learningResourceTypeLearning Resource - Textbooken_US
ecO-OER.POD.compatibleNoen_US
dc.description.abstractThis book provides a comprehensive yet methodical understanding of securing today's AI systems. It covers vulnerabilities throughout the complete machine learning life cycle from data collection, to training, and deployment and inference, as well as presents practical methods for mitigating the most harmful threats. By integrating theoretical foundations, practical case studies, and recent research, the book covers essential topics including threat modelling, adversarial attacks, poisoning attacks, and privacy breaches.en_US
dc.subject.otherTechnologyen_US
ecO-OER.ItemTypeTextbooken_US
ecO-OER.ItemTypeLearning Resourceen_US
ecO-OER.ItemTypeInstructional Objecten_US
ecO-OER.MediaFormatEPUBen_US
ecO-OER.MediaFormatPDFen_US
Appears in Collections:Ontario OER Collection

Files in This Item:
File Description SizeFormat 
Untitled-design-350x467.png%%c%%171.76 kBimage/pngView/Open
Winning-the-Battle-for-Secure-ML-1757082584.epub%%dl%% EPUB6 MBEPUBView/Open
Winning-the-Battle-for-Secure-ML-1757082545._print.pdf%%dl%% Print PDF7.73 MBPDFView/Open
Winning-the-Battle-for-Secure-ML-1757082545.pdf%%dl%% Digital PDF5.18 MBPDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.