Completed
Blackbox input manipulation example
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How AI is Impacting Cybersecurity - Does It?
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The generative Al Application landscape
- 3 Al in application security
- 4 Al engineering practices
- 5 How is security for AI/ML different?
- 6 Al security/privacy frameworks and standards
- 7 Data security risks
- 8 Al model attacks
- 9 Blackbox input manipulation example
- 10 Whitebox input manipulation example
- 11 Membership inference attack
- 12 Model inversion attack
- 13 Model theft
- 14 Model supply chain attack
- 15 Al code attacks
- 16 Guidance for mitigating security threats