Attacking Machine Learning Methods Used for Detection of Cyber Attack

Attacking Machine Learning Methods Used for Detection of Cyber Attack

WeAreDevelopers via YouTube Direct link

Why

15 of 25

15 of 25

Why

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Attacking Machine Learning Methods Used for Detection of Cyber Attack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who am I
  3. 3 About my work
  4. 4 Application domains
  5. 5 Why Machine Learning for Security
  6. 6 Machine Learning in Practice
  7. 7 Model Stealing
  8. 8 Model Inversion
  9. 9 Evasion Attack
  10. 10 Other Attacks
  11. 11 How does it work
  12. 12 How can we automate
  13. 13 Publicly available libraries
  14. 14 Intra transferability
  15. 15 Why
  16. 16 Can we defend
  17. 17 First defense
  18. 18 Defensive distillation
  19. 19 Defensive mentality
  20. 20 Effective defenses
  21. 21 Evolution Scenario
  22. 22 Cross Transfer Ability
  23. 23 Limitations
  24. 24 Conclusion
  25. 25 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.