:Search:

Linkedin Machine Learning and Artificial Intelligence Security Risk Categorizing Attacks and Failure Modes

Torrent:
Info Hash: 8E79C85312BFCD10422B0C59CDA766C39E8A84BF
Thumbnail:
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 1
Type: Tutorials
Images:
Linkedin Machine Learning and Artificial Intelligence Security Risk Categorizing Attacks and Failure Modes
Language: English
Category: Other
Size: 713.3 MB
Added: Oct. 24, 2023, 1:18 a.m.
Peers: Seeders: 3, Leechers: 2 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce 1 1 0
udp://tracker.cyberia.is:6969/announce 0 0 0
udp://tracker.opentrackr.org:1337/announce 2 0 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 1
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 001. Machine learning security concerns.en.srt 1.8 KB
  3. 001. Machine learning security concerns.mp4 16.3 MB
  4. 002. What you should know.en.srt 602 bytes
  5. 002. What you should know.mp4 3.6 MB
  6. 003. How systems can fail and how to protect th.en.srt 5.0 KB
  7. 003. How systems can fail and how to protect th.mp4 40.2 MB
  8. 004. Why does ML security matter.en.srt 8.9 KB
  9. 004. Why does ML security matter.mp4 68.2 MB
  10. 005. Attacks vs. unintentional failure modes.en.srt 4.6 KB
  11. 005. Attacks vs. unintentional failure modes.mp4 25.8 MB
  12. 006. Security goals for ML CIA.en.srt 4.6 KB
  13. 006. Security goals for ML CIA.mp4 32.7 MB
  14. 007. Perturbation attacks and AUPs.en.srt 5.4 KB
  15. 007. Perturbation attacks and AUPs.mp4 41.6 MB
  16. 008. Poisoning attacks.en.srt 5.1 KB
  17. 008. Poisoning attacks.mp4 27.4 MB
  18. 009. Reprogramming neural nets.en.srt 2.6 KB
  19. 009. Reprogramming neural nets.mp4 14.2 MB
  20. 010. Physical domain (3D adversarial objec.en.srt 3.6 KB
  21. 010. Physical domain (3D adversarial objec.mp4 30.6 MB
  22. 011. Supply chain attacks.en.srt 4.2 KB
  23. 011. Supply chain attacks.mp4 23.3 MB
  24. 012. Model inversion.en.srt 4.7 KB
  25. 012. Model inversion.mp4 27.6 MB
  26. 013. System manipulation.en.srt 4.2 KB
  27. 013. System manipulation.mp4 36.4 MB
  28. 014. Membership inference and model steali.en.srt 3.0 KB
  29. 014. Membership inference and model steali.mp4 17.6 MB
  30. 015. Backdoors and existing exploits.en.srt 3.6 KB
  31. 015. Backdoors and existing exploits.mp4 20.0 MB
  32. 016. Reward hacking.en.srt 3.4 KB
  33. 016. Reward hacking.mp4 27.2 MB
  34. 017. Side effects in rein.en.srt 3.8 KB
  35. 017. Side effects in rein.mp4 21.6 MB
  36. 018. Distributional shift.en.srt 4.5 KB
  37. 018. Distributional shift.mp4 26.0 MB
  38. 019. Overfitting underfit.en.srt 4.2 KB
  39. 019. Overfitting underfit.mp4 23.8 MB
  40. 020. Data bias considerat.en.srt 7.0 KB
  41. 020. Data bias considerat.mp4 41.5 MB
  42. 021. Effective techniques for building resilience in M.en.srt 3.7 KB
  43. 021. Effective techniques for building resilience in M.mp4 30.1 MB
  44. 022. ML dataset hygiene.en.srt 6.8 KB
  45. 022. ML dataset hygiene.mp4 38.3 MB
  46. 023. ML adversarial training.en.srt 6.0 KB
  47. 023. ML adversarial training.mp4 34.8 MB
  48. 024. ML access control to APIs.en.srt 4.1 KB
  49. 024. ML access control to APIs.mp4 25.3 MB
  50. 025. Next steps.en.srt 2.2 KB
  51. 025. Next steps.mp4 19.0 MB
  52. Bonus Resources.txt 386 bytes
  53. References.pdf 43.6 KB

Discussion