Security
3 techniques
Protecting AI systems from malicious attacks and unauthorized access.
3 techniques
Goals | Models | Data Types | Description | |||
---|---|---|---|---|---|---|
Homomorphic Encryption | Algorithmic | Model Agnostic | Any | Homomorphic encryption allows computation on encrypted data without decrypting it first, producing encrypted results... | ||
Red Teaming | Procedural | Model Agnostic | Any | Red teaming involves systematic adversarial testing of AI/ML systems by dedicated specialists who attempt to identify... | ||
Anomaly Detection | Algorithmic | Model Agnostic | Any | Anomaly detection identifies unusual behaviours, inputs, or outputs that deviate significantly from established normal... |
Rows per page
Page 1 of 1