🏠 Home
Benchmark Hub
📊 All Benchmarks 🦖 Dinosaur v1 🦖 Dinosaur v2 ✅ To-Do List Applications 🎨 Creative Free Pages 🎯 FSACB - Ultimate Showcase 🌍 Translation Benchmark
Models
🏆 Top 10 Models 🆓 Free Models 📋 All Models ⚙️ Kilo Code
Resources
💬 Prompts Library 📖 AI Glossary 🔗 Useful Links

AI Glossary

The complete dictionary of Artificial Intelligence

162
categories
2,032
subcategories
23,060
terms
📖
terms

Model Extraction

Attack where an adversary recreates a machine learning model by querying the target model's API and using the responses to train a substitute model with equivalent capabilities.

📖
terms

Membership Inference Attack

Attack technique aimed at determining whether a specific data sample was used in a model's training dataset, thereby revealing information about private training data.

📖
terms

Model Inversion Attack

Attack that approximately reconstructs training data characteristics by exploiting model outputs and prediction information to reverse the learning process.

📖
terms

Adversarial Examples

Inputs specially designed to deceive a machine learning model, exploiting the model's vulnerabilities to cause incorrect predictions while remaining imperceptible to humans.

📖
terms

Data Poisoning Attack

Attack where an adversary deliberately inserts malicious data into the training dataset to compromise model performance or create exploitable backdoors.

📖
terms

Model Stealing

Process by which an attacker illicitly extracts or replicates a proprietary machine learning model by exploiting information accessible through its API or predictive behavior.

📖
terms

Property Inference Attack

Attack aimed at inferring global properties of the training dataset, such as class distributions or correlations, without directly accessing the data.

📖
terms

Model Watermarking

Intellectual property technique that embeds invisible markers in a machine learning model to identify and prove ownership in case of theft or unauthorized reproduction.

📖
terms

Gradient Leakage

Vulnerability where shared gradients during distributed or federated training can reveal sensitive information about participants' local training data.

📖
terms

Cryptographic Primitives

Fundamental cryptographic operations such as encryption, decryption, hash functions, and digital signatures used as building blocks to construct complex security protocols.

🔍

No results found