Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attacking Machine Learning Methods Used for Detection of Cyber Attack
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who am I
- 3 About my work
- 4 Application domains
- 5 Why Machine Learning for Security
- 6 Machine Learning in Practice
- 7 Model Stealing
- 8 Model Inversion
- 9 Evasion Attack
- 10 Other Attacks
- 11 How does it work
- 12 How can we automate
- 13 Publicly available libraries
- 14 Intra transferability
- 15 Why
- 16 Can we defend
- 17 First defense
- 18 Defensive distillation
- 19 Defensive mentality
- 20 Effective defenses
- 21 Evolution Scenario
- 22 Cross Transfer Ability
- 23 Limitations
- 24 Conclusion
- 25 Questions