YoVDO

Machine Duping - Pwning Deep Learning Systems

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Machine Learning Courses Deep Learning Courses Neural Networks Courses Privacy Courses Speech Recognition Courses Convolutional Networks Courses Text Generation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities of deep learning systems in this comprehensive conference talk from GrrCon 2016. Delve into the world of hacking machine learning, focusing on deep learning techniques and their widespread applications. Understand neural networks, convolutional networks, and recurrent neural networks, along with their roles in text generation, speech recognition, and long-term memory. Discover the potential attack vectors in the text economy and learn about blind spots in machine learning models. Examine three key steps and methods for exploiting deep learning systems, including transferability and substitute models. Gain insights into false assumptions and privacy concerns surrounding deep learning technologies. Conclude with a Q&A session to address specific inquiries about machine duping and pwning deep learning systems.

Syllabus

Introduction
Hacking Machine Learning
Deep Learning
Deep Learning is Everywhere
Why Use Deep Learning
Neural Networks
Convolutional Networks
Layered Learning
Recurrent Neural Networks
Text Generation
Long Term Memory
Speech Recognition
Machine Learning
Attack Text Economy
Blind Spots
Three Steps
First Way
Transferability
Substitute Models
False Assumptions
Three Methods
Deep Boning
Deep Learning Privacy
Questions


Related Courses

Intro to Deep Learning with PyTorch
Facebook via Udacity
Natural Language Processing with Sequence Models
DeepLearning.AI via Coursera
Deep Learning
Universidad AnĂ¡huac via edX
Create a Superhero Name Generator with TensorFlow
Coursera Project Network via Coursera
Natural Language Generation in Python
DataCamp