Overview
Syllabus
Intro
Typical Setup at Home
Physical Real-World Attacks
Splicing Demo 1
Splicing Demo 2
Future Attacks 1
Future Attacks 2
Attacking Al Assistant Business Logic
Architecture
Understanding Slots
Attackable Slots
Neural Networks and the Brain
Techniques for Attacking Neural Networks
What Can You Attack with Adversarial Examples?
Why Do Adversarial Masks work?
Adversarial Result
Adversarial Input Generation Techniques
White Box Adversarial Attack • Techniques
White Box Adversarial Attack Techniques
Black Box Adversarial Attack
Adversarial Patches
Defending against adversarial samples
Trojaning neural networks
Defending against trojans
Model Data Extraction
Training Data Extraction
Summary
Taught by
OWASP Foundation