-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Adversarial AI Attacks, Mitigations, and Defense Strategies
By :
Adversarial AI Attacks, Mitigations, and Defense Strategies
By:
Overview of this book
Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies, moving beyond research hype or business-as-usual activities. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.
This strategy-based book is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.
By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.
Table of Contents (28 chapters)
Preface
Chapter 1: Getting Started with AI
Chapter 2: Building Our Adversarial Playground
Chapter 3: Security and Adversarial AI
Part 2: Model Development Attacks
Chapter 4: Poisoning Attacks
Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming
Chapter 6: Supply Chain Attacks and Adversarial AI
Part 3: Attacks on Deployed AI
Chapter 7: Evasion Attacks against Deployed AI
Chapter 8: Privacy Attacks – Stealing Models
Chapter 9: Privacy Attacks – Stealing Data
Chapter 10: Privacy-Preserving AI
Part 4: Generative AI and Adversarial Attacks
Chapter 11: Generative AI – A New Frontier
Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks
Chapter 13: LLM Foundations for Adversarial AI
Chapter 14: Adversarial Attacks with Prompts
Chapter 15: Poisoning Attacks and LLMs
Chapter 16: Advanced Generative AI Scenarios
Part 5: Secure-by-Design AI and MLSecOps
Chapter 17: Secure by Design and Trustworthy AI
Chapter 18: AI Security with MLSecOps
Chapter 19: Maturing AI Security
Chapter 20: Unlock Your Book’s Exclusive Benefits
Index
Other Books You May Enjoy
Customer Reviews