AI is ubiquitous and is finding its application in almost all domains, be it for simple sentence correction purpose or space navigation. The analogy of how AI behaves and thinks like a human, gives an impression that AI is quite simple and does not include much complicated programming. However, the…
Model Stealing: Show me “Everything” you got!
Model Stealing Attack (Ref: Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey, Miao et al.) By now you must have realised how Model Stealing attack is different from Inference attack. While Inference attack focuses on extracting training data information and intends to rebuild a training dataset, model…
Inference Attack: Show Me What You Got!
Inference Attack (Ref: MEMBERSHIP INFERENCE ATTACKS AGAINST MACHINE LEARNING MODELSReza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov (2017)Presented by Christabella Irwanto) In previous blog entries, we had a basic understanding of what data poisoning attack is, what does Evasion attack do, and how are data poisoning and Evasion attacks…
Evasion Attack: Fooling AI Model
In an earlier blog, we had a fair knowledge about data poisoning, wherein the adversary is able to make changes to the training data, filling it with corrupt information so as to malign the AI algorithm such that it is trained according to malicious information to render a corrupt, biased…
Data Poisoning: A Catch-22 Situation
What is Data Poisoning? If you all remember a famous case of data bias issue, wherein Google Photos labeled a picture of African-American couple as “Gorillas”, then you know what I am talking about. ML models which are the subset of AI, are specifically susceptible to such data poisoning attacks….