🏠 Beranda
Benchmark
📊 Semua Benchmark 🦖 Dinosaurus v1 🦖 Dinosaurus v2 ✅ Aplikasi To-Do List 🎨 Halaman Bebas Kreatif 🎯 FSACB - Showcase Utama 🌍 Benchmark Terjemahan
Model
🏆 Top 10 Model 🆓 Model Gratis 📋 Semua Model ⚙️ Kilo Code
Sumber Daya
💬 Perpustakaan Prompt 📖 Glosarium AI 🔗 Tautan Berguna

Glosarium AI

Kamus lengkap Kecerdasan Buatan

162
kategori
2.032
subkategori
23.060
istilah
📖
istilah

Model Extraction

Attack where an adversary recreates a machine learning model by querying the target model's API and using the responses to train a substitute model with equivalent capabilities.

📖
istilah

Membership Inference Attack

Attack technique aimed at determining whether a specific data sample was used in a model's training dataset, thereby revealing information about private training data.

📖
istilah

Model Inversion Attack

Attack that approximately reconstructs training data characteristics by exploiting model outputs and prediction information to reverse the learning process.

📖
istilah

Adversarial Examples

Inputs specially designed to deceive a machine learning model, exploiting the model's vulnerabilities to cause incorrect predictions while remaining imperceptible to humans.

📖
istilah

Data Poisoning Attack

Attack where an adversary deliberately inserts malicious data into the training dataset to compromise model performance or create exploitable backdoors.

📖
istilah

Model Stealing

Process by which an attacker illicitly extracts or replicates a proprietary machine learning model by exploiting information accessible through its API or predictive behavior.

📖
istilah

Property Inference Attack

Attack aimed at inferring global properties of the training dataset, such as class distributions or correlations, without directly accessing the data.

📖
istilah

Model Watermarking

Intellectual property technique that embeds invisible markers in a machine learning model to identify and prove ownership in case of theft or unauthorized reproduction.

📖
istilah

Gradient Leakage

Vulnerability where shared gradients during distributed or federated training can reveal sensitive information about participants' local training data.

📖
istilah

Cryptographic Primitives

Fundamental cryptographic operations such as encryption, decryption, hash functions, and digital signatures used as building blocks to construct complex security protocols.

🔍

Tidak ada hasil ditemukan