Often we get confused between different types of Supervised learning models available. This is majorly due to lack of understanding of the goal and applicability of each kind of model. In this blogpost, I will try to clarify the difference and purpose of each kind of Supervised learning model using…
Month: February 2023
Key Research Work on AI against Traditional Cybersecurity Measures
With the intelligence accompanied, AI has tapped enormous strength to stealthily bypass traditional cybersecurity measures. This blogpost enlists some key research work available in public domain that bring out insightful results on how AI in its adversarial form can be used to fool or bypass traditional cybersecurity measures. Such research…
Comparative Assessment of Critical Adversarial AI Attacks
Often we come across various adversarial AI attacks. Over the time, there have been numerous attacks surfacing with extensive use of one or more AI model(s) together in any application. In this blog post, a one stop platform summarizing the critical adversarial AI attacks is provided. The comparative assessment of…
Comparative Assessment of Critical AI Models
This blog post is a one stop platform for summary of different AI models that are in predominant use. The comparative assessment of these models is based on various parameters such as – Definition, Process, Main Learning Approach, Pros, Cons, and Applications. The idea is to summarize these models and…
Triggered vs. Triggerless Backdoor Attacks using a Single Example
In previous blog post, there was an introduction to backdoor attack and its various forms. In this post, I will provide the basic difference between the two forms of attacks using a single example so as to understand the difference in a more precise manner and I will finally provide…