🏠 Home
Benchmark Hub
📊 All Benchmarks 🦖 Dinosaur v1 🦖 Dinosaur v2 ✅ To-Do List Applications 🎨 Creative Free Pages 🎯 FSACB - Ultimate Showcase 🌍 Translation Benchmark
Models
🏆 Top 10 Models 🆓 Free Models 📋 All Models ⚙️ Kilo Code
Resources
💬 Prompts Library 📖 AI Glossary 🔗 Useful Links

AI Glossary

The complete dictionary of Artificial Intelligence

162
categories
2,032
subcategories
23,060
terms
📂
subcategories

Homomorphic Encryption

Allows performing mathematical calculations directly on encrypted data without decrypting them beforehand

18 terms
📂
subcategories

Differential Privacy

Technique that adds controlled noise to data to protect individual information while preserving statistical properties

17 terms
📂
subcategories

Federated Learning

Distributed training approach where models improve locally without centralizing sensitive data

6 terms
📂
subcategories

Adversarial Attacks and Defenses

Study of malicious manipulations of models and development of countermeasures to maintain their robustness

16 terms
📂
subcategories

Secure Multi-Party Computation

Cryptographic protocols that allow multiple parties to collaborate on a computation without revealing their private data

14 terms
📂
subcategories

Privacy Mechanisms

Set of formal techniques ensuring information protection in learning systems

7 terms
📂
subcategories

Model Evasion

Detection and Prevention Techniques for Sensitive Information Leaks from Trained Models

10 terms
📂
subcategories

Local Differential Privacy

Variant of differential privacy applied directly at the level of individual data before collection

20 terms
📂
subcategories

Attribute Inference

Protection against attacks aimed at inferring sensitive information from model outputs

7 terms
📂
subcategories

Model Robustness

Reinforcement of machine learning models to resist manipulations and maintain their performance

13 terms
📂
subcategories

Anonymization and K-Anonymity

Identity masking techniques ensuring that each record cannot be distinguished from at least k-1 others

15 terms
📂
subcategories

Secure Model Downloading

Protocols for protecting models during their transfer and deployment in unsecured environments

16 terms
📂
subcategories

Secure Aggregation

Methods for securely combining results from multiple sources without compromising confidentiality

10 terms
📂
subcategories

Private Cross-Validation

Model evaluation techniques without exposing original training or test data

17 terms
📂
subcategories

Data Perturbation

Controlled modification of training data to prevent information leakage while preserving utility

5 terms
🔍

No results found