Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security Vulnerabilities in AI Assistant Based Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Typical Setup at Home
- 3 Physical Real-World Attacks
- 4 Splicing Demo 1
- 5 Splicing Demo 2
- 6 Future Attacks 1
- 7 Future Attacks 2
- 8 Attacking Al Assistant Business Logic
- 9 Architecture
- 10 Understanding Slots
- 11 Attackable Slots
- 12 Neural Networks and the Brain
- 13 Techniques for Attacking Neural Networks
- 14 What Can You Attack with Adversarial Examples?
- 15 Why Do Adversarial Masks work?
- 16 Adversarial Result
- 17 Adversarial Input Generation Techniques
- 18 White Box Adversarial Attack • Techniques
- 19 White Box Adversarial Attack Techniques
- 20 Black Box Adversarial Attack
- 21 Adversarial Patches
- 22 Defending against adversarial samples
- 23 Trojaning neural networks
- 24 Defending against trojans
- 25 Model Data Extraction
- 26 Training Data Extraction
- 27 Summary