Security

3 techniques

Protecting AI systems from malicious attacks and unauthorized access.

3 techniques
GoalsModelsData TypesDescription
Homomorphic Encryption
Algorithmic
Model Agnostic
Any
Homomorphic encryption allows computation on encrypted data without decrypting it first, producing encrypted results...
Red Teaming
Procedural
Model Agnostic
Any
Red teaming involves systematic adversarial testing of AI/ML systems by dedicated specialists who attempt to identify...
Anomaly Detection
Algorithmic
Model Agnostic
Any
Anomaly detection identifies unusual behaviours, inputs, or outputs that deviate significantly from established normal...
Rows per page
Page 1 of 1