🏠 Ana Sayfa
Benchmarklar
📊 Tüm Benchmarklar 🦖 Dinozor v1 🦖 Dinozor v2 ✅ To-Do List Uygulamaları 🎨 Yaratıcı Serbest Sayfalar 🎯 FSACB - Nihai Gösteri 🌍 Çeviri Benchmarkı
Modeller
🏆 En İyi 10 Model 🆓 Ücretsiz Modeller 📋 Tüm Modeller ⚙️ Kilo Code
Kaynaklar
💬 Prompt Kütüphanesi 📖 YZ Sözlüğü 🔗 Faydalı Bağlantılar

YZ Sözlüğü

Yapay Zekanın tam sözlüğü

162
kategoriler
2.032
alt kategoriler
23.060
terimler
📖
terimler

Evasion Attack

Attack technique that subtly modifies input data to deceive an AI model during the inference phase, without altering human perception of the information.

📖
terimler

DeepFool Attack

Iterative algorithm that calculates the minimum distance to decision boundaries to produce adversarial examples with the smallest possible perturbations.

📖
terimler

Universal Adversarial Perturbation

Single perturbation capable of effectively deceiving a model across a wide range of different inputs, without requiring recalculation for each sample.

📖
terimler

Transferability Attack

Exploitation of the phenomenon where adversarial examples generated against one model remain effective against other models with different architectures.

📖
terimler

Lp Distance Attack

Family of attacks that measure and limit the amplitude of perturbations according to different norms (L0, L1, L2, L∞) to control their perceptibility.

📖
terimler

Score-Based Attack

Black-box attack that uses the model's confidence scores to estimate gradients and build effective adversarial examples.

📖
terimler

Decision-Based Attack

Extreme black-box attack that uses only the predicted output labels from the model to generate adversarial perturbations.

📖
terimler

Physical Attack

Attack where adversarial perturbations are applied to physical objects to deceive AI systems in real-world conditions.

📖
terimler

Attaque Zero-Day

Attaque qui exploite des vulnérabilités inconnues du système de défense, rendant les mécanismes de détection traditionnels inefficaces.

📖
terimler

Attaque par Encodage

Technique qui modifie les représentations encodées des données plutôt que les données brutes pour contourner les défenses basées sur l'entrée.

📖
terimler

Attaque par Transformation

Attaque qui applique des transformations géométriques (rotation, translation) aux données d'entrée pour tromper le modèle sans modifications de pixels directes.

📖
terimler

Attaque EOT (Expectation over Transformation)

Technique d'optimisation qui rend les attaques robustes aux variations aléatoires en optimisant sur une distribution de transformations possibles.

📖
terimler

Attaque par AutoEncodeur Adversarial

Méthode qui utilise des autoencodeurs pour générer des perturbations imperceptibles tout en préservant la sémantique originale des données.

🔍

Sonuç bulunamadı