Beyond the Algorithm by Omar Santos;Petar Radanliev;
Author:Omar Santos;Petar Radanliev;
Language: eng
Format: epub
Publisher: Pearson Education (US)
Published: 2024-02-15T00:00:00+00:00
Threat actors may obtain full white-box access to a machine learning model, giving them a complete understanding of the modelâs architecture, its parameters, and class ontology. They might steal the model to craft adversarial data and verify the attack in an offline setting where their activities are challenging to detect.
Table 5-2 summarizes the model access techniques.
Table 5-2 Model Access Attack Techniques
Type of Model Access Techniques
Techniques Used
Inference API Access
Discover ML model ontology, discover ML model family, verify attack, craft adversarial data, evade ML model, erode ML model integrity
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
In-Memory Analytics with Apache Arrow by Matthew Topol(2701)
PostgreSQL 14 Administration Cookbook by Simon Riggs(2227)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1805)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1248)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(1046)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(1029)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(912)
Python GUI Programming with Tkinter, 2nd edition by Alan D. Moore(882)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(753)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(753)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(431)
Introduction to Algorithms, Fourth Edition by unknow(388)
ABAP Development for SAP HANA by Unknown(368)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(311)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | Rom Adams | Chen Xi(293)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(285)
Asynchronous Programming in Rust by Carl Fredrik Samson;(272)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(264)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(260)
