🏠 Ana Sayfa
Benchmarklar
📊 Tüm Benchmarklar 🦖 Dinozor v1 🦖 Dinozor v2 ✅ To-Do List Uygulamaları 🎨 Yaratıcı Serbest Sayfalar 🎯 FSACB - Nihai Gösteri 🌍 Çeviri Benchmarkı
Modeller
🏆 En İyi 10 Model 🆓 Ücretsiz Modeller 📋 Tüm Modeller ⚙️ Kilo Code
Kaynaklar
💬 Prompt Kütüphanesi 📖 YZ Sözlüğü 🔗 Faydalı Bağlantılar

YZ Sözlüğü

Yapay Zekanın tam sözlüğü

162
kategoriler
2.032
alt kategoriler
23.060
terimler
📂
alt kategoriler

Homomorphic Encryption

Allows performing mathematical calculations directly on encrypted data without decrypting them beforehand

18 terimler
📂
alt kategoriler

Differential Privacy

Technique that adds controlled noise to data to protect individual information while preserving statistical properties

17 terimler
📂
alt kategoriler

Federated Learning

Distributed training approach where models improve locally without centralizing sensitive data

6 terimler
📂
alt kategoriler

Adversarial Attacks and Defenses

Study of malicious manipulations of models and development of countermeasures to maintain their robustness

16 terimler
📂
alt kategoriler

Secure Multi-Party Computation

Cryptographic protocols that allow multiple parties to collaborate on a computation without revealing their private data

14 terimler
📂
alt kategoriler

Privacy Mechanisms

Set of formal techniques ensuring information protection in learning systems

7 terimler
📂
alt kategoriler

Model Evasion

Detection and Prevention Techniques for Sensitive Information Leaks from Trained Models

10 terimler
📂
alt kategoriler

Local Differential Privacy

Variant of differential privacy applied directly at the level of individual data before collection

20 terimler
📂
alt kategoriler

Attribute Inference

Protection against attacks aimed at inferring sensitive information from model outputs

7 terimler
📂
alt kategoriler

Model Robustness

Reinforcement of machine learning models to resist manipulations and maintain their performance

13 terimler
📂
alt kategoriler

Anonymization and K-Anonymity

Identity masking techniques ensuring that each record cannot be distinguished from at least k-1 others

15 terimler
📂
alt kategoriler

Secure Model Downloading

Protocols for protecting models during their transfer and deployment in unsecured environments

16 terimler
📂
alt kategoriler

Secure Aggregation

Methods for securely combining results from multiple sources without compromising confidentiality

10 terimler
📂
alt kategoriler

Private Cross-Validation

Model evaluation techniques without exposing original training or test data

17 terimler
📂
alt kategoriler

Data Perturbation

Controlled modification of training data to prevent information leakage while preserving utility

5 terimler
🔍

Sonuç bulunamadı