Preface About the Editors Contributors Part I. Secure AI/ML Systems: Attack Models 1. Machine Learning Attack Models Jing Lin, Long Dang, Mohamed Rahouti, and Kaiqi Xiong 2. Adversarial Machine Learning: A New Threat Paradigm for Next-generation Wireless Communications Yalin E. Sagduyu, Yi Shi, Tugba Erpek, William Headley, Bryse Flowers, George Stantchev, Zhuo Lu, and Brian Jalaian 3. Threat of Adversarial Attacks to Deep Learning: A Survey Linsheng He and Fei Hu 4. Attack Models for Collaborative Deep Learning Jiamiao Zhao, Fei Hu, and Xiali Hei 5. Attacks on Deep Reinforcement Learning Systems: A Tutorial Joseph Layton and Fei Hu 6. Trust and Security of Deep Reinforcement Learning Yen- Hung Chen, Mu- Tien Huang, and Yuh- Jong Hu 7. IoT Threat Modeling using Bayesian Networks Diego Heredia Part II. Secure AI/ML Systems: Defenses 8. Survey of Machine Learning Defense Strategies Joseph Layton, Fei Hu, and Xiali Hei 9. Defenses Against Deep Learning Attacks Linsheng He and Fei Hu 10. Defensive Schemes for Cyber Security of Deep Reinforcement Learning Jiamiao Zhao, Fei Hu, and Xiali Hei 11. Adversarial Attacks on Machine Learning Models in Cyber-Physical Systems Mahbub Rahman and Fei Hu 12. Federated Learning and Blockchain: An Opportunity for Artificial Intelligence with Data Regulation Darine Ameyed, Fehmi Jaafar, Riadh ben Chaabene, and Mohamed Cheriet Part III. Using AI/ML Algorithms for Cyber Security 13. Using Machine Learning for Cyber Security: Overview D. Roshni Thanka, G. Jaspher W. Kathrine, and E. Bijolin Edwin 14. Performance of Machine Learning and Big Data Analytics Paradigms in Cyber Security Gabriel Kabanda 15. Using ML and DL Algorithms for Intrusion Detection in Industrial Internet of Things. Nicole do Vale Dalarmelina, Pallavi Arora, Baljeet Kaur, Rodolfo Ipolito Meneguette, and Marcio Andrey Teixeira Part IV. Applications 16. On Detecting Interest Flooding Attacks in Named Data Networking (NDN)-based IoT Searches Hengshuo Liang, Lauren Burgess, Weixian Liao, Qianlong Wang, and Wei Yu 17. Attack on Fraud Detection Systems in Online Banking Using Generative Adversarial Networks Jerzy Surma and Krzysztof Jagiello 18. An Artificial Intelligence-assisted Security Analysis of Smart Healthcare Systems Nur Imtiazul Haque and Mohammad Ashiqur Rahman 19. A User-centric Focus for Detecting Phishing Emails Regina Eckhardt and Sikha Bagui