🏠 Hem
Benchmarkar
📊 Alla benchmarkar 🦖 Dinosaur v1 🦖 Dinosaur v2 ✅ To-Do List-applikationer 🎨 Kreativa fria sidor 🎯 FSACB - Ultimata uppvisningen 🌍 Översättningsbenchmark
Modeller
🏆 Topp 10 modeller 🆓 Gratis modeller 📋 Alla modeller ⚙️ Kilo Code
Resurser
💬 Promptbibliotek 📖 AI-ordlista 🔗 Användbara länkar

AI-ordlista

Den kompletta ordlistan över AI

162
kategorier
2 032
underkategorier
23 060
termer
📂
underkategorier

White-Box Attacks

Attacks where the adversary has complete knowledge of the target model's architecture and parameters.

15 termer
📂
underkategorier

Black-Box Attacks

Attacks performed without internal knowledge of the model, solely through interactions with its inputs/outputs.

18 termer
📂
underkategorier

Evasion Attacks

Subtle perturbations of input data to deceive the model during inference.

13 termer
📂
underkategorier

Poisoning Attacks

Injection of malicious data into the training set to compromise the model.

17 termer
📂
underkategorier

Model Extraction Attacks

Theft of parameters or functionality of a proprietary model through repeated queries.

17 termer
📂
underkategorier

Membership Inference Attacks

Determining whether a specific data point was part of the training set.

11 termer
📂
underkategorier

Adversarial Training Defense

Training the model on generated adversarial examples to improve its robustness.

15 termer
📂
underkategorier

Défense par Détection d'Attaques

Mécanismes pour identifier et rejeter les entrées potentiellement adversariales.

18 termer
📂
underkategorier

Gradient Masking Defense

Techniques masking gradients to prevent optimization-based attacks.

17 termer
📂
underkategorier

Attacks on Computer Vision

Attacks specifically designed to deceive image classification and object detection models.

8 termer
📂
underkategorier

Attacks on NLP

Subtle textual perturbations to fool natural language processing models.

17 termer
📂
underkategorier

Transfer Attacks

Attacks generated on a source model but effective against different target models.

16 termer
📂
underkategorier

Randomization Defense

Introduction of stochasticity into the inference process to disrupt attacks.

16 termer
📂
underkategorier

Attacks on Audio Models

Imperceptible sound perturbations designed to fool speech recognition systems.

20 termer
📂
underkategorier

Robustness Evaluation

Metrics and benchmarks for quantifying model resistance to adversarial attacks.

17 termer
🔍

Inga resultat hittades