Fighting New Era Bandits Who Are Plundering Your AI - ML Application
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Session Outline Agenda
Security Threats across AIOT Cycle
Internal Experiment: Stealing/Extracting Al Model (1/2)
Data is no more oil: Model Extraction Attacks Industry Level Threat to Al Investment
Model Extraction Attacks - Taxonomy Exponential Growth in Attack Surface and types
CVE-2019-20634: ProofPoint Evasion Real life example
Technical Deep Dive : Attack Vectors & Results
Model Extraction Attacks - Results from Real Enviornment Stealing ML models from Web APIs
Internal Experiment: Example Kill chain Leveraging MEA Evading Person Detection - Intelligent Security Camera System
Patented Protection Mechanism against Model Extraction Att 14 family of Defense Mechanisms - Detection of attack
Patented Protection Mechanism Performance Active Defense: Detection + Action (Class Swap)
Patented Protection Mechanism against MEA AlShield Tool Demo
Prioritization with Simplified Scenario Planning Understand future with critical assumptions Critical Assumption
Taught by
RSA Conference
Related Courses
Introduction to Artificial IntelligenceStanford University via Udacity Natural Language Processing
Columbia University via Coursera Probabilistic Graphical Models 1: Representation
Stanford University via Coursera Computer Vision: The Fundamentals
University of California, Berkeley via Coursera Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent