AIセキュリティポータル K Program
AI Product Security: A Primer for Developers
Share
Abstract
Not too long ago, AI security used to mean the research and practice of how AI can empower cybersecurity, that is, AI for security. Ever since Ian Goodfellow and his team popularized adversarial attacks on machine learning, security for AI became an important concern and also part of AI security. It is imperative to understand the threats to machine learning products and avoid common pitfalls in AI product development. This article is addressed to developers, designers, managers and researchers of AI software products.
Membership inference attacks from first principles
Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramer
Published: 2022
Model inversion attacks that exploit confidence information and basic countermeasures
Matt Fredrikson, Somesh Jha, Thomas Ristenpart
Published: 2015
Computer security checklist for non-security technology professionals
Chlotia P Garrison, Roderick B Posey
Published: 2006
Explaining and harnessing adversarial examples
Ian J Goodfellow, Jonathon Shlens, Christian Szegedy
Published: 2015
Software Supply Chain Best Practices
CNCF Security Technical Advisory Group
Published: 2021
Deep residual learning for image recognition
Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun
Published: 2016
High Accuracy and High Fidelity Extraction of Neural Networks
Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
Published: 9.4.2019
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference
Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique
Published: 11.5.2018
Defending against adversarial machine learning aJacks using hierarchical learning: A case study on network traffic aJack classification
McCarthy, A., Ghadafi, E., Andriotis, P., Legg, P.
Published: 2023
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, Ananthram Swami
Published: 11.14.2015
The Transport Layer Security (TLS) Protocol Version 1.3
E. Rescorla
Published: 2018
Applications in security and evasions in machine learning: a survey
Ramani Sagar, Rutvij Jhaveri, Carlos Borrego
Published: 2020
Hardening web applications using a least privilege DBMS access model
Stuart Steiner, Daniel Conte de Leon, Ananth A Jillepalli
Published: 2018
Transfer learning without knowing: Reprogramming black-box machine learning models with scarce data and limited resources
Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho
Published: 2020
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects
C. Wang, J. Chen, Y. Yang, X. Ma, J. Liu
Published: 2022
Adversarial examples: Attacks and defenses for deep learning
X. Yuan, P. He, Q. Zhu, X. Li
Published: 2019
Share