Difference between revisions of "Offense - Adversarial Threats/Attacks"

From
Jump to: navigation, search
m
m (Data Poisoning)
Line 48: Line 48:
 
[http://www.youtube.com/results?search_query=Poisoning+Label+Flipping+Adversarial+threat+attack+defcon+Deep+Learning+Artificial+Intelligence Youtube search...]
 
[http://www.youtube.com/results?search_query=Poisoning+Label+Flipping+Adversarial+threat+attack+defcon+Deep+Learning+Artificial+Intelligence Youtube search...]
 
[http://www.google.com/search?q=Poisoning+Label+Flippingadversarial+threat+attack+defcon+deep+machine+learning+ML+artificial+intelligence ...Google search]
 
[http://www.google.com/search?q=Poisoning+Label+Flippingadversarial+threat+attack+defcon+deep+machine+learning+ML+artificial+intelligence ...Google search]
 +
 +
* [http://arxiv.org/pdf/2207.01982.pdf Defending against the Label-flipping Attack in Federated Learning | Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez and Alberto Blanco-Justicia]
 +
  
 
<youtube>OB54mKmUjmI</youtube>
 
<youtube>OB54mKmUjmI</youtube>

Revision as of 06:51, 4 October 2022

Youtube search... ...Google search

______________________________________________________


Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to cause the model to make a mistake; they’re like optical illusions for machines. Myth: An attacker must have access to the model to generate adversarial examples. Fact: Adversarial examples generalize across models trained to perform the same task, even if those models have different architectures and were trained on a different training set. This means an attacker can train their own model, generate adversarial examples against it, and then deploy those adversarial examples against a model they do not have access to. -Deep Learning Adversarial Examples – Clarifying Misconceptions | Goodfellow et al.

endgame-ai-agent.jpg

Data Poisoning

Youtube search... ...Google search