Security Vulnerabilities in AI Assistant Based Applications

Security Vulnerabilities in AI Assistant Based Applications

OWASP Foundation via YouTube Direct link

Intro

1 of 27

1 of 27

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security Vulnerabilities in AI Assistant Based Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Typical Setup at Home
  3. 3 Physical Real-World Attacks
  4. 4 Splicing Demo 1
  5. 5 Splicing Demo 2
  6. 6 Future Attacks 1
  7. 7 Future Attacks 2
  8. 8 Attacking Al Assistant Business Logic
  9. 9 Architecture
  10. 10 Understanding Slots
  11. 11 Attackable Slots
  12. 12 Neural Networks and the Brain
  13. 13 Techniques for Attacking Neural Networks
  14. 14 What Can You Attack with Adversarial Examples?
  15. 15 Why Do Adversarial Masks work?
  16. 16 Adversarial Result
  17. 17 Adversarial Input Generation Techniques
  18. 18 White Box Adversarial Attack • Techniques
  19. 19 White Box Adversarial Attack Techniques
  20. 20 Black Box Adversarial Attack
  21. 21 Adversarial Patches
  22. 22 Defending against adversarial samples
  23. 23 Trojaning neural networks
  24. 24 Defending against trojans
  25. 25 Model Data Extraction
  26. 26 Training Data Extraction
  27. 27 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.