{"image_url":"https://images-fe.ssl-images-amazon.com/images/I/51c9u%2BRmrcL._SL160_.jpg","categories":["Security"],"blog_url":"https://yamdas.hatenablog.com/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fyamdas.hatenablog.com%2Fentry%2F20180129%2Fmlsecurity\" title=\" \u30aa\u30e9\u30a4\u30ea\u30fc\u304b\u3089\u51fa\u308b\u300c\u6a5f\u68b0\u5b66\u7fd2\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u672c\u306f\u53d7\u3051\u308b\u3068\u307f\u305f\uff01 - YAMDAS\u73fe\u66f4\u65b0\u5c65\u6b74\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","url":"https://yamdas.hatenablog.com/entry/20180129/mlsecurity","published":"2018-01-29 00:00:02","author_name":"yomoyomo","height":"190","provider_name":"Hatena Blog","version":"1.0","title":" \u30aa\u30e9\u30a4\u30ea\u30fc\u304b\u3089\u51fa\u308b\u300c\u6a5f\u68b0\u5b66\u7fd2\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u672c\u306f\u53d7\u3051\u308b\u3068\u307f\u305f\uff01","author_url":"https://blog.hatena.ne.jp/yomoyomo/","type":"rich","description":"Machine Learning and Security - O'Reilly Media \u6570\u5e74\u524d\u306b\u300c\u30c7\u30fc\u30bf\u99c6\u52d5\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u3092\u8b33\u3046\u672c\u3092\u53d6\u308a\u4e0a\u3052\u305f\u3053\u3068\u304c\u3042\u308b\u304c\uff08\u305d\u306e1\u3001\u305d\u306e2\uff09\u3001\u30ba\u30d0\u30ea\u300c\u6a5f\u68b0\u5b66\u7fd2\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u3092\u30c6\u30fc\u30de\u3068\u3059\u308b\u672c\u3092\u51fa\u3059\u3068\u306f\u3055\u3059\u304c\u30aa\u30e9\u30a4\u30ea\u30fc\u3002\u30b9\u30d1\u30e0\u30d5\u30a3\u30eb\u30bf\u3001\u7570\u5e38\u691c\u77e5\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u89e3\u6790\u3001\u653b\u6483\u691c\u77e5\u3068\u3044\u3063\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u306b\u6a5f\u68b0\u5b66\u7fd2\u3092\u6d3b\u7528\u3059\u308b\u3068\u3044\u3046\u5185\u5bb9\u3060\u304c\u3001\u3053\u308c\u306f\u58f2\u308c\u308b\u3068\u307f\u305f\u3002\u4eca\u5e74\u4e2d\u306b\u90a6\u8a33\u3082\u51fa\u308b\u3093\u3058\u3083\u306a\u3044\u304b\u306a\u3002Machine Learning and Security: Protecting Systems with Data and Algorithms\u4f5c\u8005: Clarence Ch\u2026","blog_title":"YAMDAS\u73fe\u66f4\u65b0\u5c65\u6b74","provider_url":"https://hatena.blog"}