[FreeCoursesOnline.Me] PacktPub - Securing Your AI and Machine Learning Systems [Video]
0. Websites you may like/How you can help our Group!.txt 208 B 1 - Machine Learning Security/01 - The Course Overview.mp4 40.9 MB 1 - Machine Learning Security/02 - Introduction to ML Security.mp4 29.9 MB 1 - Machine Learning Security/03 - Setting Up the Environment.mp4 15 MB 2 - Security Test Using Adversarial Attack/04 - Introduction to Machine Learning Tasks.mp4 26 MB 2 - Security Test Using Adversarial Attack/05 - Attacks Against ML with Examples.mp4 7.3 MB 2 - Security Test Using Adversarial Attack/06 - Categories of ML Tasks and Attacks.mp4 9.9 MB 2 - Security Test Using Adversarial Attack/07 - Attacks on Classification and How They Work.mp4 5.4 MB 2 - Security Test Using Adversarial Attack/08 - Practical Example ..Adversarial Challenge.mp4 17 MB 3 - Build a Threat Model and Learn Different Attacks on AI/09 - Most Common AI Solutions and Threats.mp4 45.9 MB 3 - Build a Threat Model and Learn Different Attacks on AI/10 - Confidentiality, Availability, and Integrity Attacks.mp4 5.1 MB 3 - Build a Threat Model and Learn Different Attacks on AI/11 - Poisoning Attacks, Privacy, and Backdoor Attacks Theory.mp4 9 MB 3 - Build a Threat Model and Learn Different Attacks on AI/12 - Practical Poisoning Attacks.mp4 12.9 MB 3 - Build a Threat Model and Learn Different Attacks on AI/13 - Practical Privacy Attacks.mp4 15.2 MB 3 - Build a Threat Model and Learn Different Attacks on AI/14 - Practical Backdoor Attacks.mp4 17.1 MB 4 - Testing Image Classification/15 - Building an Image Classification Task and Its Peculiarities.mp4 5.5 MB 4 - Testing Image Classification/16 - Adversarial Attacks and Their Distinctive Features.mp4 9.7 MB 4 - Testing Image Classification/17 - White-Box Adversarial with Example.mp4 9.3 MB 4 - Testing Image Classification/18 - Grey-Box Adversarial with Example.mp4 9.4 MB 4 - Testing Image Classification/19 - Black-Box Adversarial with Example.mp4 9.5 MB 5 - Compare Various Attacks/20 - Adversarial Attacks Metrics and White-Box Adversarial Attacks.mp4 7.3 MB 5 - Compare Various Attacks/21 - BIM Attack Practical Configuration.mp4 16.1 MB 5 - Compare Various Attacks/22 - CW Attack Practical Configuration.mp4 10.5 MB 5 - Compare Various Attacks/23 - DeepFool Attack Practical Configuration.mp4 9.7 MB 5 - Compare Various Attacks/24 - PGD Attack Practical Configuration.mp4 15.2 MB 5 - Compare Various Attacks/25 - Comparing Metrics and Choosing the Best Attack.mp4 11.9 MB 6 - Choosing the Right Defense/26 - Introduction to Various Defense Approaches to Adversarial Attacks.mp4 7.3 MB 6 - Choosing the Right Defense/27 - The Current State of Defenses.mp4 2.7 MB 6 - Choosing the Right Defense/28 - Testing Practical Defense from Adversarial Training Category.mp4 11.8 MB 6 - Choosing the Right Defense/29 - Testing Practical Defence from Modified Input Category.mp4 8.3 MB 6 - Choosing the Right Defense/30 - Testing Practical Defence from Modified Model Category.mp4 4.4 MB 6 - Choosing the Right Defense/31 - Comparing Defence Approaches and Choosing the Best Defence.mp4 15.2 MB 7 - Summary and Future Trends/32 - Combining Everything Together.mp4 7.3 MB 7 - Summary and Future Trends/33 - An Approach to Testing AI Solutions.mp4 3 MB 7 - Summary and Future Trends/34 - Preparing the Environment.mp4 9.9 MB 7 - Summary and Future Trends/35 - Importing the Models.mp4 8 MB 7 - Summary and Future Trends/36 - Testing the Attacks.mp4 13 MB 7 - Summary and Future Trends/37 - Choosing the Defenses.mp4 15 MB 7 - Summary and Future Trends/38 - The Future of AI Attacks.mp4 9 MB 7 - Summary and Future Trends/39 - Sources and Recommendations.mp4 16.5 MB 7 - Summary and Future Trends/40 - Conclusions and Best Wishes.mp4 9 MB 9781838826451_Code.zip 261 MB