YoVDO

Defending Against Adversarial Model Attacks Using Kubeflow

Offered By: Linux Foundation via YouTube

Tags

Adversarial Machine Learning Courses Explainable AI Courses Kubeflow Courses Kubeflow Pipelines Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore defensive strategies against adversarial model attacks in this 43-minute conference talk by IBM experts Animesh Singh and Andrew Butler. Delve into the vision for Trusted AI, understand various adversarial threats, and learn how to leverage Kubeflow and Kubeflow pipelines for robust model protection. Gain insights into the Square Attack technique, examine key parameters, and witness practical demonstrations of explainer flows. Discover the importance of building adversarial teams and acquire valuable contact information for further inquiries on enhancing AI model security.

Syllabus

Introduction
Presentation
Vision for Trusted AI
Adversarial Threats
Art and Practice
Kubeflow
Kubeflow pipelines
Square Attack
Parameters
Explainer Spec
Explainer Flow
Explainer Demo
Adversarial Team
Contact Information
Conclusion


Taught by

Linux Foundation

Tags

Related Courses

Bringing ML Workflows to Heterogeneous Cloud Native Machine Learning Platforms Using Intermediate Representation
Linux Foundation via YouTube
Bringing ML Workflows to Heterogeneous Cloud Native Machine Learning Platforms Using Intermediate Representation
Linux Foundation via YouTube
Build a Reproducible ML Workflow with Kubeflow Pipelines
Linux Foundation via YouTube
DevOps in Data Science - What Works and What Doesn't
CNCF [Cloud Native Computing Foundation] via YouTube
Component Registry for Kubeflow Pipelines
CNCF [Cloud Native Computing Foundation] via YouTube