Adversarial Machine Learning: A Beginner’s Guide to Adversarial Attacks and Defensesby@miguelhzbz
2,727 reads

Adversarial Machine Learning: A Beginner’s Guide to Adversarial Attacks and Defenses

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

There are [four types of attacks] that ML models can suffer. An adversary steals a copy of a remotely deployed machine learning model, given oracle prediction access. Extraction attacks aim to extract as much information as possible and with the set of inputs and outputs train a model called substitute model. Extract model is hard**, the attacker needs a huge compute capacity to re-training the new model with accuracy and fidelity, and substitute model is equivalen to training a model from the ground up.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Adversarial Machine Learning: A Beginner’s Guide to Adversarial Attacks and Defenses
Miguel Hernández HackerNoon profile picture

@miguelhzbz

Miguel Hernández

Security researcher that learns and manifests new concepts and skills continuously. Speaker at several sec conferences.


Receive Stories from @miguelhzbz

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!