🏠 Home
Benchmark
📊 Tutti i benchmark 🦖 Dinosauro v1 🦖 Dinosauro v2 ✅ App To-Do List 🎨 Pagine libere creative 🎯 FSACB - Ultimate Showcase 🌍 Benchmark traduzione
Modelli
🏆 Top 10 modelli 🆓 Modelli gratuiti 📋 Tutti i modelli ⚙️ Kilo Code
Risorse
💬 Libreria di prompt 📖 Glossario IA 🔗 Link utili

Glossario IA

Il dizionario completo dell'Intelligenza Artificiale

162
categorie
2.032
sottocategorie
23.060
termini
📖
termini

Attribute Inference Attack

Attack where an adversary attempts to infer sensitive attributes not present in the training data from the model's predictions. This attack exploits the implicit correlations learned by the model to reveal private information about individuals.

📖
termini

Shadow Model Attack

Attack where the adversary trains alternative models on synthetic data to mimic the behavior of the target model. These shadow models allow generating training examples to build an effective attack classifier.

📖
termini

Privacy Leak Quantification

Systematic methods for measuring and evaluating the amount of private information disclosed by a machine learning model. These metrics help quantify leak risks and assess the effectiveness of protection mechanisms.

📖
termini

Adversarial Privacy Defense

Proactive defense techniques that incorporate privacy constraints directly into the model's training objective. These methods simultaneously optimize the model's performance and its resistance to inference attacks.

📖
termini

Knowledge Distillation for Privacy

Technique where a private teacher model is used to train a public student model, transferring knowledge while masking sensitive information. This approach reduces the final model's ability to memorize specific details of the training data.

📖
termini

Privacy-Aware Model Design

Architectural design principles integrating privacy protection mechanisms from the model design stage. This approach includes limiting model capacity, adding regularization, and designing less informative outputs.

📖
termini

Model Extraction Attack

Attack where an adversary attempts to replicate or steal a proprietary model by querying its predictions and training a substitute model. This attack can also reveal information about the original training data.

🔍

Nessun risultato trovato