Главная
Study mode:
on
1
Introduction
2
Input Manipulation Attack
3
Data Poisoning Attack
4
Model Inversion Attack
5
Model Stealing
6
AI Supply Chain Attack
7
Transfer Learning Attack
8
Model Skewing Attack
9
Output Integrity Attack
10
Model Poisoning Attack
11
Conclusion
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the OWASP Top 10 for Machine Learning Security in this 57-minute conference talk from DevSecCon. Gain practical insights into key security challenges and best practices specific to machine learning. Delve into an in-depth overview of each of the top ten vulnerabilities, including input manipulation, data poisoning, model inversion, model stealing, AI supply chain attacks, transfer learning attacks, model skewing, output integrity attacks, and model poisoning. Learn from real-world examples and case studies illustrating how these vulnerabilities manifest. Discover actionable recommendations for mitigating risks and implementing strategies to ensure robust and secure ML deployments. Equip yourself with essential knowledge to enhance the security posture of machine learning projects, whether you're a developer, data scientist, or security professional.

OWASP Top 10 for Machine Learning Security - A Comprehensive Walkthrough

DevSecCon
Add to list