Create Tool:
Create Time:1970-01-01 08:00:00
File Size:713.32 MB
File Count:53
File Hash:8e79c85312bfcd10422b0c59cda766c39e8a84bf
Get Bonus Downloads Here.url | 180 B |
~Get Your Files Here !/1. Introduction/001. Machine learning security concerns.en.srt | 1.80 KB |
~Get Your Files Here !/1. Introduction/001. Machine learning security concerns.mp4 | 16.27 MB |
~Get Your Files Here !/1. Introduction/002. What you should know.en.srt | 602 B |
~Get Your Files Here !/1. Introduction/002. What you should know.mp4 | 3.59 MB |
~Get Your Files Here !/2. Machine Learning Foundations/003. How systems can fail and how to protect th.en.srt | 4.98 KB |
~Get Your Files Here !/2. Machine Learning Foundations/003. How systems can fail and how to protect th.mp4 | 40.19 MB |
~Get Your Files Here !/2. Machine Learning Foundations/004. Why does ML security matter.en.srt | 8.93 KB |
~Get Your Files Here !/2. Machine Learning Foundations/004. Why does ML security matter.mp4 | 68.19 MB |
~Get Your Files Here !/2. Machine Learning Foundations/005. Attacks vs. unintentional failure modes.en.srt | 4.58 KB |
~Get Your Files Here !/2. Machine Learning Foundations/005. Attacks vs. unintentional failure modes.mp4 | 25.81 MB |
~Get Your Files Here !/2. Machine Learning Foundations/006. Security goals for ML CIA.en.srt | 4.56 KB |
~Get Your Files Here !/2. Machine Learning Foundations/006. Security goals for ML CIA.mp4 | 32.68 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/007. Perturbation attacks and AUPs.en.srt | 5.37 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/007. Perturbation attacks and AUPs.mp4 | 41.63 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/008. Poisoning attacks.en.srt | 5.07 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/008. Poisoning attacks.mp4 | 27.42 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/009. Reprogramming neural nets.en.srt | 2.65 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/009. Reprogramming neural nets.mp4 | 14.25 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/010. Physical domain (3D adversarial objec.en.srt | 3.55 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/010. Physical domain (3D adversarial objec.mp4 | 30.56 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/011. Supply chain attacks.en.srt | 4.19 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/011. Supply chain attacks.mp4 | 23.29 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/012. Model inversion.en.srt | 4.70 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/012. Model inversion.mp4 | 27.63 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/013. System manipulation.en.srt | 4.25 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/013. System manipulation.mp4 | 36.37 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/014. Membership inference and model steali.en.srt | 3.00 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/014. Membership inference and model steali.mp4 | 17.65 MB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/015. Backdoors and existing exploits.en.srt | 3.61 KB |
~Get Your Files Here !/3. Intentional Failure Modes Attacks/015. Backdoors and existing exploits.mp4 | 20.01 MB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/016. Reward hacking.en.srt | 3.40 KB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/016. Reward hacking.mp4 | 27.20 MB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/017. Side effects in rein.en.srt | 3.83 KB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/017. Side effects in rein.mp4 | 21.57 MB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/018. Distributional shift.en.srt | 4.46 KB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/018. Distributional shift.mp4 | 26.03 MB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/019. Overfitting underfit.en.srt | 4.17 KB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/019. Overfitting underfit.mp4 | 23.80 MB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/020. Data bias considerat.en.srt | 7.02 KB |
~Get Your Files Here !/4. Unintentional Failure Modes Intrinsic Design Flaws/020. Data bias considerat.mp4 | 41.53 MB |
~Get Your Files Here !/5. Building Resilient ML/021. Effective techniques for building resilience in M.en.srt | 3.69 KB |
~Get Your Files Here !/5. Building Resilient ML/021. Effective techniques for building resilience in M.mp4 | 30.12 MB |
~Get Your Files Here !/5. Building Resilient ML/022. ML dataset hygiene.en.srt | 6.79 KB |
~Get Your Files Here !/5. Building Resilient ML/022. ML dataset hygiene.mp4 | 38.31 MB |
~Get Your Files Here !/5. Building Resilient ML/023. ML adversarial training.en.srt | 6.02 KB |
~Get Your Files Here !/5. Building Resilient ML/023. ML adversarial training.mp4 | 34.77 MB |
~Get Your Files Here !/5. Building Resilient ML/024. ML access control to APIs.en.srt | 4.07 KB |
~Get Your Files Here !/5. Building Resilient ML/024. ML access control to APIs.mp4 | 25.31 MB |
~Get Your Files Here !/6. Conclusion/025. Next steps.en.srt | 2.24 KB |
~Get Your Files Here !/6. Conclusion/025. Next steps.mp4 | 18.99 MB |
~Get Your Files Here !/Bonus Resources.txt | 386 B |
~Get Your Files Here !/Ex_Files_ML_and_AI_Security_Risk_Categorizing_Attacks/Exercise Files/References.pdf | 43.58 KB |
No trackers found |
TorrentBank
Copyright © 2024