Trustworthy AI by Beena Ammanath

Trustworthy AI by Beena Ammanath

Author:Beena Ammanath [Ammanath, Beena]
Language: eng
Format: epub
ISBN: 9781119867951
Publisher: Wiley
Published: 2022-03-07T00:00:00+00:00


What Does AI Compromise Look Like?

Many business leaders understand the core elements in cybersecurity: strong access credentials, active system monitoring, and employee training for effective cyber hygiene and avoiding social engineering attacks. Those elements are insufficient for AI security due to how AI systems operate and evolve, as well as the novel attack vectors cybercriminals and bad actors are still discovering.

These are the early days of AI security. Much focus is put on basic taxonomy, classifying how security may be circumvented, and from there, deciphering how it can be mitigated. As a starting point, consider a three‐axis taxonomy as conceived by researchers at the University of California, Berkeley:5

Influence – An attack can be causative (i.e., influencing the data) or exploratory (i.e., observing how AI responds to an action).

Security violation – The attack can yield false negatives (integrity violation) or false positives (availability violation).

Specificity – The attack can be focused on a specific classifier in an AI system (targeted) or directed to classifiers across a system or many systems (indiscriminate).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
In-Memory Analytics with Apache Arrow by Matthew Topol(2712)
Data Forecasting and Segmentation Using Microsoft Excel by Fernando Roque(2709)
PostgreSQL 14 Administration Cookbook by Simon Riggs(2240)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1937)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1256)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(1061)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(1036)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(925)
Python GUI Programming with Tkinter, 2nd edition by Alan D. Moore(894)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(767)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(762)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(440)
Introduction to Algorithms, Fourth Edition by unknow(411)
ABAP Development for SAP HANA by Unknown(376)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(319)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | 
Rom Adams
 | Chen Xi(300)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(297)
Asynchronous Programming in Rust by Carl Fredrik Samson;(280)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(271)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(269)