Posted on
in Presentations
Adversaries of AI applications continuously advance their tools for evasion, poisoning, extraction, and inference against the underlying machine learning models to achieve their malicious goals. This technical talk will introduce the actual open source tools to reproduce these attacks and the tools needed to defend and evaluate applications before deploying and exposing them to adversaries.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community