PacktPub | Securing Your AI and Machine Learning Systems [Video] [FCO]
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size772.3 MB
- Uploaded BySunRiseZone
- Downloads56
- Last checkedFeb. 06th '20
- Date uploadedFeb. 06th '20
- Seeders 22
- Leechers10
Lynda and other Courses >>> https://www.freecoursesonline.me/
For Developer Tools & Apps >>> https://ftuapps.com/
Forum for discussion >>> https://1hack.us/
Author : Alexander Polyakov
Released : 22 Jan 2020
Duration : 2 hours 10 minutes
Course Source : https://www.packtpub.com/in/data/securing-your-ai-and-machine-learning-systems-video
Design secure AI/ML solutions
Learn
• Design secure AI solution architectures to cover all aspects of AI security from model to environment
• Create a high-level threat model for AI solutions and choose the right priorities against various threats
• Design specific security tests for image recognition systems
• Test any AI system against the latest attacks with the help of simple tools
• Learn the most important metrics to compare various attacks and defences
• Deploy the right defence methods to protect AI systems against attacks by comparing their efficiency
• Secure your AI systems with the help of practical open-source tools
About
Artificial Intelligence (AI) is literally eating software as more and more solutions become ML-based. Unfortunately, these systems also have vulnerabilities; but, compared to software security, few people are really knowledgeable about this area. If it’s impossible to secure AI against cyberattacks, there will be no AI-based technologies, such as self-driving cars, and yet another “AI winter” will soon be on us.
This course is almost certainly the first public, online, hands-on introduction to the future perspectives of cybersecurity and adopts a clear and easy-to-follow approach. In this course, you will learn about high-level risks targeting AI/ML systems. You will design specific security tests for image recognition systems and master techniques to test against attacks. You will then learn about various categories of adversarial attacks and how to choose the right defense strategy.
By the end of this course, you will be acquainted with various attacks and, more importantly, with the steps that you can take to secure your AI and machine learning systems effectively. For this course, practical experience with Python, machine learning, and deep learning frameworks is assumed, along with some basic math skills.
All the code and supporting files for this course are available on GitHub at:
https://github.com/PacktPublishing/Securing-Your-AI-and-Machine-Learning-Systems
Features
• Gain practical experience with various open-source tools such as ART (Adversarial Robustness Toolkit) and DeepSec, developed to test machine learning algorithms for security
• Learn to design secure AI solutions depending on risks that are typical for your application with the help of a unique approach
• Understand the attacks and different approaches for securing various AI/ML systems
ISBN 9781838826451
Files:
[FreeCoursesOnline.Me] PacktPub - Securing Your AI and Machine Learning Systems [Video] 0. Websites you may like- 0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url (0.4 KB)
- 1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url (0.3 KB)
- 2. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, & more.etc.url (0.2 KB)
- 3. (FTUApps.com) Download Cracked Developers Applications For Free.url (0.2 KB)
- How you can help our Group!.txt (0.2 KB)
- 01 - The Course Overview.mp4 (40.9 MB)
- 02 - Introduction to ML Security.mp4 (29.9 MB)
- 03 - Setting Up the Environment.mp4 (15.0 MB)
- 04 - Introduction to Machine Learning Tasks.mp4 (26.0 MB)
- 05 - Attacks Against ML with Examples.mp4 (7.3 MB)
- 06 - Categories of ML Tasks and Attacks.mp4 (9.9 MB)
- 07 - Attacks on Classification and How They Work.mp4 (5.4 MB)
- 08 - Practical Example ..Adversarial Challenge.mp4 (17.0 MB)
- 09 - Most Common AI Solutions and Threats.mp4 (45.9 MB)
- 10 - Confidentiality, Availability, and Integrity Attacks.mp4 (5.1 MB)
- 11 - Poisoning Attacks, Privacy, and Backdoor Attacks Theory.mp4 (9.0 MB)
- 12 - Practical Poisoning Attacks.mp4 (12.9 MB)
- 13 - Practical Privacy Attacks.mp4 (15.2 MB)
- 14 - Practical Backdoor Attacks.mp4 (17.1 MB)
- 15 - Building an Image Classification Task and Its Peculiarities.mp4 (5.5 MB)
- 16 - Adversarial Attacks and Their Distinctive Features.mp4 (9.7 MB)
- 17 - White-Box Adversarial with Example.mp4 (9.3 MB)
- 18 - Grey-Box Adversarial with Example.mp4 (9.4 MB)
- 19 - Black-Box Adversarial with Example.mp4 (9.5 MB)
- 20 - Adversarial Attacks Metrics and White-Box Adversarial Attacks.mp4 (7.3 MB)
- 21 - BIM Attack Practical Configuration.mp4 (16.1 MB)
- 22 - CW Attack Practical Configuration.mp4 (10.5 MB)
- 23 - DeepFool Attack Practical Configuration.mp4 (9.7 MB)
- 24 - PGD Attack Practical Configuration.mp4 (15.2 MB)
- 25 - Comparing Metrics and Choosing the Best Attack.mp4 (11.9 MB)
- 26 - Introduction to Various Defense Approaches to Adversarial Attacks.mp4 (7.3 MB)
- 27 - The Current State of Defenses.mp4 (2.7 MB)
- 28 - Testing Practical Defense from Adversarial Training Category.mp4 (11.8 MB)
- 29 - Testing Practical Defence from Modified Input Category.mp4 (8.3 MB)
- 30 - Testing Practical Defence from Modified Model Category.mp4 (4.4 MB)
- 31 - Comparing Defence Approaches and Choosing the Best Defence.mp4 (15.2 MB)
- 32 - Combining Everything Together.mp4 (7.3 MB)
- 33 - An Approach to Testing AI Solutions.mp4 (3.0 MB)
- 34 - Preparing the Environment.mp4 (9.9 MB)
- 35 - Importing the Models.mp4 (8.0 MB)
- 36 - Testing the Attacks.mp4 (13.0 MB)
- 37 - Choosing the Defenses.mp4 (15.0 MB)
- 38 - The Future of AI Attacks.mp4 (9.0 MB)
- 39 - Sources and Recommendations.mp4 (16.5 MB)
- 40 - Conclusions and Best Wishes.mp4 (9.0 MB)
- 9781838826451_Code.zip (261.0 MB)
Code:
- udp://open.demonii.si:1337/announce
- udp://p4p.arenabg.com:1337/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.cyberia.is:6969/announce
- udp://tracker.uw0.xyz:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://denis.stalker.upeer.me:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://open.stealth.si:80/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://tracker.iamhansen.xyz:2000/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://opentor.org:2710/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.zerobytes.xyz:1337/announce
- https://tracker.opentracker.se:443/announce
- https://tracker.nanoha.org:443/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.nyaa.uk:6969/announce
- udp://9.rarbg.com:2790/announce
- http://tracker.ygsub.com:6969/announce
- udp://9.rarbg.me:2730/announce
- udp://9.rarbg.to:2790/announce
- udp://open.nyap2p.com:6969/announce
- udp://tracker-udp.gbitt.info:80/announce
- http://t.nyaatracker.com:80/announce
- http://tracker.files.fm:6969/announce
- udp://tracker-udp.gbitt.info:80/announce
- udp://9.rarbg.to:2710/announce
- udp://9.rarbg.me:2710/announce