From the course: Security Risks in AI and Machine Learning: Categorizing Attacks and Failure Modes
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Supply chain attacks
From the course: Security Risks in AI and Machine Learning: Categorizing Attacks and Failure Modes
Supply chain attacks
- [Instructor] With all of the great code plugins and libraries available for use, it's rare that anyone writes a new app from scratch these days. If you need map functionality in your app, you don't write a mapping system from scratch, you embed one of the many popular map services or APIs. Developers speed up delivery by leveraging each other's work thanks to a robust and complex software supply chain. A supply chain that includes AI and ML development too thanks to pretrained models and Model Zoos. One of the most well known pretrained models is GPT-3: Generative Pretrained Transformer 3. GPT-3 generates written text when it is queried with certain prompts. So for example, if you want to have a poem written about COVID, you could ask GPT-3 to do that for you. How about a cookie recipe or a new song? GPT-3 can do that too. It would be cost prohibitive for most companies to train their own language generation model,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Perturbation attacks and AUPs3m 31s
-
(Locked)
Poisoning attacks3m 11s
-
(Locked)
Reprogramming neural nets1m 39s
-
(Locked)
Physical domain (3D adversarial objects)2m 34s
-
(Locked)
Supply chain attacks2m 42s
-
(Locked)
Model inversion3m 12s
-
(Locked)
System manipulation3m 2s
-
(Locked)
Membership inference and model stealing2m 3s
-
(Locked)
Backdoors and existing exploits2m 19s
-
-
-
-