🏠 Ana Sayfa
Benchmarklar
📊 Tüm Benchmarklar 🦖 Dinozor v1 🦖 Dinozor v2 ✅ To-Do List Uygulamaları 🎨 Yaratıcı Serbest Sayfalar 🎯 FSACB - Nihai Gösteri 🌍 Çeviri Benchmarkı
Modeller
🏆 En İyi 10 Model 🆓 Ücretsiz Modeller 📋 Tüm Modeller ⚙️ Kilo Code
Kaynaklar
💬 Prompt Kütüphanesi 📖 YZ Sözlüğü 🔗 Faydalı Bağlantılar

YZ Sözlüğü

Yapay Zekanın tam sözlüğü

162
kategoriler
2.032
alt kategoriler
23.060
terimler
📂
alt kategoriler

White-Box Attacks

Attacks where the adversary has complete knowledge of the target model's architecture and parameters.

15 terimler
📂
alt kategoriler

Black-Box Attacks

Attacks performed without internal knowledge of the model, solely through interactions with its inputs/outputs.

18 terimler
📂
alt kategoriler

Evasion Attacks

Subtle perturbations of input data to deceive the model during inference.

13 terimler
📂
alt kategoriler

Poisoning Attacks

Injection of malicious data into the training set to compromise the model.

17 terimler
📂
alt kategoriler

Model Extraction Attacks

Theft of parameters or functionality of a proprietary model through repeated queries.

17 terimler
📂
alt kategoriler

Membership Inference Attacks

Determining whether a specific data point was part of the training set.

11 terimler
📂
alt kategoriler

Adversarial Training Defense

Training the model on generated adversarial examples to improve its robustness.

15 terimler
📂
alt kategoriler

Défense par Détection d'Attaques

Mécanismes pour identifier et rejeter les entrées potentiellement adversariales.

18 terimler
📂
alt kategoriler

Gradient Masking Defense

Techniques masking gradients to prevent optimization-based attacks.

17 terimler
📂
alt kategoriler

Attacks on Computer Vision

Attacks specifically designed to deceive image classification and object detection models.

8 terimler
📂
alt kategoriler

Attacks on NLP

Subtle textual perturbations to fool natural language processing models.

17 terimler
📂
alt kategoriler

Transfer Attacks

Attacks generated on a source model but effective against different target models.

16 terimler
📂
alt kategoriler

Randomization Defense

Introduction of stochasticity into the inference process to disrupt attacks.

16 terimler
📂
alt kategoriler

Attacks on Audio Models

Imperceptible sound perturbations designed to fool speech recognition systems.

20 terimler
📂
alt kategoriler

Robustness Evaluation

Metrics and benchmarks for quantifying model resistance to adversarial attacks.

17 terimler
🔍

Sonuç bulunamadı