Securing ML Workloads with Kubeflow and MLOps - Pwned By Statistics

Securing ML Workloads with Kubeflow and MLOps - Pwned By Statistics

Linux Foundation via YouTube Direct link

MLOps

4 of 25

4 of 25

MLOps

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing ML Workloads with Kubeflow and MLOps - Pwned By Statistics

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why ML
  3. 3 Why ML is hard
  4. 4 MLOps
  5. 5 Circle Detector
  6. 6 Wolf vs Husky Detector
  7. 7 Flaws in Federated Learning
  8. 8 Additional Techniques
  9. 9 Building a Pipeline
  10. 10 Extracting Your Model
  11. 11 Distillation Attack
  12. 12 Model Extraction Attack
  13. 13 Hidden Data Attack
  14. 14 Secret Memorization
  15. 15 Leakage Detection
  16. 16 Summary
  17. 17 Questions
  18. 18 AutoML
  19. 19 AI Models
  20. 20 Data Drift
  21. 21 Attack Systems
  22. 22 Differential Privacy
  23. 23 Threat Modeling
  24. 24 ML Ops
  25. 25 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.