🏠 Hem
Benchmarkar
📊 Alla benchmarkar 🦖 Dinosaur v1 🦖 Dinosaur v2 ✅ To-Do List-applikationer 🎨 Kreativa fria sidor 🎯 FSACB - Ultimata uppvisningen 🌍 Översättningsbenchmark
Modeller
🏆 Topp 10 modeller 🆓 Gratis modeller 📋 Alla modeller ⚙️ Kilo Code
Resurser
💬 Promptbibliotek 📖 AI-ordlista 🔗 Användbara länkar

AI-ordlista

Den kompletta ordlistan över AI

162
kategorier
2 032
underkategorier
23 060
termer
📖
termer

Model Extraction

Attack where an adversary recreates a machine learning model by querying the target model's API and using the responses to train a substitute model with equivalent capabilities.

📖
termer

Membership Inference Attack

Attack technique aimed at determining whether a specific data sample was used in a model's training dataset, thereby revealing information about private training data.

📖
termer

Model Inversion Attack

Attack that approximately reconstructs training data characteristics by exploiting model outputs and prediction information to reverse the learning process.

📖
termer

Adversarial Examples

Inputs specially designed to deceive a machine learning model, exploiting the model's vulnerabilities to cause incorrect predictions while remaining imperceptible to humans.

📖
termer

Data Poisoning Attack

Attack where an adversary deliberately inserts malicious data into the training dataset to compromise model performance or create exploitable backdoors.

📖
termer

Model Stealing

Process by which an attacker illicitly extracts or replicates a proprietary machine learning model by exploiting information accessible through its API or predictive behavior.

📖
termer

Property Inference Attack

Attack aimed at inferring global properties of the training dataset, such as class distributions or correlations, without directly accessing the data.

📖
termer

Model Watermarking

Intellectual property technique that embeds invisible markers in a machine learning model to identify and prove ownership in case of theft or unauthorized reproduction.

📖
termer

Gradient Leakage

Vulnerability where shared gradients during distributed or federated training can reveal sensitive information about participants' local training data.

📖
termer

Cryptographic Primitives

Fundamental cryptographic operations such as encryption, decryption, hash functions, and digital signatures used as building blocks to construct complex security protocols.

🔍

Inga resultat hittades