René's URL Explorer Experiment


Title: Proposals for model vulnerability and security – O’Reilly

Open Graph Title: Proposals for model vulnerability and security

X Title: Proposals for model vulnerability and security

Description: Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.

Open Graph Description: Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.

X Description: Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.

Opengraph URL: https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/

X: @OReillyMedia

direct link

Domain: www.oreilly.com


Hey, it has json ld scripts:
{
    "@context": "https://schema.org",
    "@type": "BreadcrumbList",
    "itemListElement": [
        {
            "@type": "ListItem",
            "position": 1,
            "name": "O'Reilly",
            "item": "https://www.oreilly.com/"
        },
        {
            "@type": "ListItem",
            "position": 2,
            "name": "Radar",
            "item": "https://www.oreilly.com/radar/"
        },
        {
            "@type": "ListItem",
            "position": 3,
            "name": "Proposals for model vulnerability and security",
            "item": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/"
        }
    ]
}
{
  "@context": "https://schema.org",
  "@type": "BlogPosting",
  "@id": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/#BlogPosting",
  "mainEntityOfPage": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/",
  "headline": "Proposals for model vulnerability and security",
  "description": "Like many others, I’ve known for some time that machine learning models themselves could pose security risks. A recent flourish of posts and papers has outlined the broader topic, listed attack vectors and vulnerabilities, started to propose defensive solutions, and provided the necessary framework for this post. The objective here is to brainstorm on potential …",
  "image": {
    "@type": "ImageObject",
    "url": "https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg"
  },
  "author": [
    {"@type": "Person", "name": "Patrick Hall", "url": "https://www.oreilly.com/people/patrick-hall/"}  ],
  "publisher": {
    "@type": "Organization",
    "name": "O'Reilly Media",
    "url": "https://www.oreilly.com/",
    "logo": {
      "@type": "ImageObject",
      "url": "https://cdn.oreillystatic.com/images/sitewide-headers/oreilly_logo_mark_red.svg",
      "width": 200,
      "height": 50
    }
  },
  "datePublished": "2019-03-20",
  "dateModified": "2019-03-20",
  "wordCount": "4210",
  "timeRequired": "PT22M",
  "keywords": [],
  "genre": ["Artificial Intelligence"],
  "isPartOf": {
    "@type": "Blog",
    "name": "O'Reilly Radar",
    "url": "https://www.oreilly.com/radar/"
  },
  "potentialAction": {
    "@type": "ViewAction",
    "target": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/",
    "name": "Read Full Article"
  }
}

msapplication-TileImagehttps://www.oreilly.com/content/wp-content/uploads/sites/2/2025/04/cropped-favicon_512x512-270x270.png
NoneIE=edge
language_nameEnglish
native_language_nameEnglish
format-detectiontelephone=no
twitter:cardsummary_large_image
twitter:urlhttps://www.oreilly.com/content/proposals-for-model-vulnerability-and-security
twitter:imagehttps://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg
og:typearticle
og:site_nameO’Reilly Media
og:imagehttps://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg
authorPatrick Hall
description:siteApply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.
article:published_time2019-03-20T14:50:00-04:00
article:authorPatrick Hall
date2019-03-20
thumbnailhttps://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg
graphic_mediumhttps://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg
oreilly:content_typetext

Links:

Skip to main contenthttps://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#maincontent
For Enterprisehttps://www.oreilly.com/online-learning/teams.html
For Governmenthttps://www.oreilly.com/online-learning/government.html
For Higher Edhttps://www.oreilly.com/online-learning/academic.html
For Individualshttps://www.oreilly.com/online-learning/individuals.html
For Marketinghttps://www.oreilly.com/content-marketing-solutions.html
https://www.oreilly.com
Microsoft Azurehttps://www.oreilly.com/search/skills/microsoft-azure/
Amazon Web Services (AWS)https://www.oreilly.com/search/skills/amazon-web-services-aws/
Google Cloudhttps://www.oreilly.com/search/skills/google-cloud/
Cloud Migrationhttps://www.oreilly.com/search/skills/cloud-migration/
Cloud Deploymenthttps://www.oreilly.com/search/skills/cloud-deployment/
Cloud Platformshttps://www.oreilly.com/search/skills/cloud-platforms/
View allhttps://www.oreilly.com/search/skills/cloud-computing/
Data Warehousehttps://www.oreilly.com/search/skills/data-warehouse/
SQLhttps://www.oreilly.com/search/skills/sql/
Apache Sparkhttps://www.oreilly.com/search/skills/apache-spark/
Microsoft SQL Serverhttps://www.oreilly.com/search/skills/microsoft-sql-server/
MySQLhttps://www.oreilly.com/search/skills/mysql/
Kafkahttps://www.oreilly.com/search/skills/kafka/
Data Lakehttps://www.oreilly.com/search/skills/data-lake/
Streaming & Messaginghttps://www.oreilly.com/search/skills/streaming-messaging/
NoSQL Databaseshttps://www.oreilly.com/search/skills/nosql-databases/
Relational Databaseshttps://www.oreilly.com/search/skills/relational-databases/
View allhttps://www.oreilly.com/search/skills/data-engineering/
Pandashttps://www.oreilly.com/search/topics/pandas/
Rhttps://www.oreilly.com/search/topics/r/
MATLABhttps://www.oreilly.com/search/topics/matlab/
SAShttps://www.oreilly.com/search/topics/sas/
D3https://www.oreilly.com/search/topics/d3/
Power BIhttps://www.oreilly.com/search/topics/power-bi/
Tableauhttps://www.oreilly.com/search/topics/tableau/
Statisticshttps://www.oreilly.com/search/topics/statistics/
Exploratory Data Analysishttps://www.oreilly.com/search/topics/exploratory-data-analysis/
Data Visualizationhttps://www.oreilly.com/search/topics/data-visualization/
View allhttps://www.oreilly.com/search/skills/data-science/
Generative AIhttps://www.oreilly.com/search/skills/generative-ai/
Machine Learninghttps://www.oreilly.com/search/skills/machine-learning/
Artificial Intelligence (AI)https://www.oreilly.com/search/skills/artificial-intelligence-ai/
Deep Learninghttps://www.oreilly.com/search/skills/deep-learning/
Reinforcement Learninghttps://www.oreilly.com/search/skills/reinforcement-learning/
Natural Language Processinghttps://www.oreilly.com/search/skills/natural-language-processing/
TensorFlowhttps://www.oreilly.com/search/skills/tensorflow/
Scikit-Learnhttps://www.oreilly.com/search/skills/scikit-learn/
Hyperparameter Tuninghttps://www.oreilly.com/search/skills/hyperparameter-tuning/
MLOpshttps://www.oreilly.com/search/skills/mlops/
View allhttps://www.oreilly.com/search/skills/ai-ml/
Javahttps://www.oreilly.com/search/skills/java/
JavaScripthttps://www.oreilly.com/search/skills/javascript/
Springhttps://www.oreilly.com/search/skills/spring/
Pythonhttps://www.oreilly.com/search/skills/python/
Gohttps://www.oreilly.com/search/skills/go/
C#https://www.oreilly.com/search/skills/c-sharp/
C++https://www.oreilly.com/search/skills/c-plus-plus/
Chttps://www.oreilly.com/search/skills/c/
Swifthttps://www.oreilly.com/search/skills/swift/
Rusthttps://www.oreilly.com/search/skills/rust/
Functional Programminghttps://www.oreilly.com/search/skills/functional-programming/
View allhttps://www.oreilly.com/search/skills/programming-languages/
Object-Orientedhttps://www.oreilly.com/search/skills/object-oriented-architecture/
Distributed Systemshttps://www.oreilly.com/search/skills/distributed-systems/
Domain-Driven Designhttps://www.oreilly.com/search/skills/domain-driven-design/
Architectural Patternshttps://www.oreilly.com/search/skills/architectural-patterns/
View allhttps://www.oreilly.com/search/skills/software-architecture/
Kuberneteshttps://www.oreilly.com/search/topics/kubernetes/
Dockerhttps://www.oreilly.com/search/topics/docker/
GitHubhttps://www.oreilly.com/search/topics/github/
Terraformhttps://www.oreilly.com/search/topics/terraform/
Continuous Deliveryhttps://www.oreilly.com/search/topics/continuous-delivery/
Continuous Integrationhttps://www.oreilly.com/search/topics/continuous-integration/
Database Administrationhttps://www.oreilly.com/search/topics/database-administration/
Computer Networkinghttps://www.oreilly.com/search/topics/computer-networking/
Operating Systemshttps://www.oreilly.com/search/topics/operating-systems/
IT Certificationshttps://www.oreilly.com/search/topics/it-certifications/
View allhttps://www.oreilly.com/search/skills/it-operations/
Network Securityhttps://www.oreilly.com/search/skills/network-security/
Application Securityhttps://www.oreilly.com/search/skills/application-security/
Incident Responsehttps://www.oreilly.com/search/skills/incident-response/
Zero Trust Modelhttps://www.oreilly.com/search/skills/zero-trust-model/
Disaster Recoveryhttps://www.oreilly.com/search/skills/disaster-recovery/
Penetration Testing / Ethical Hackinghttps://www.oreilly.com/search/skills/penetration-testing-ethical-hacking/
Governancehttps://www.oreilly.com/search/skills/governance/
Malwarehttps://www.oreilly.com/search/skills/malware/
Security Architecturehttps://www.oreilly.com/search/skills/security-architecture/
Security Engineeringhttps://www.oreilly.com/search/skills/security-engineering/
Security Certificationshttps://www.oreilly.com/search/skills/security-certifications/
View allhttps://www.oreilly.com/search/skills/security/
Web Designhttps://www.oreilly.com/search/skills/web-design/
Graphic Designhttps://www.oreilly.com/search/skills/graphic-design/
Interaction Designhttps://www.oreilly.com/search/skills/interaction-design/
Film & Videohttps://www.oreilly.com/search/skills/film-video/
User Experience (UX)https://www.oreilly.com/search/skills/user-experience-ux/
Design Processhttps://www.oreilly.com/search/skills/design-process/
Design Toolshttps://www.oreilly.com/search/skills/design-tools/
View allhttps://www.oreilly.com/search/skills/design/
Agilehttps://www.oreilly.com/search/skills/agile/
Project Managementhttps://www.oreilly.com/search/skills/project-management/
Product Managementhttps://www.oreilly.com/search/skills/product-management/
Marketinghttps://www.oreilly.com/search/skills/marketing/
Human Resourceshttps://www.oreilly.com/search/skills/human-resources/
Financehttps://www.oreilly.com/search/skills/finance/
Team Managementhttps://www.oreilly.com/search/skills/team-management/
Business Strategyhttps://www.oreilly.com/search/skills/business-strategy/
Digital Transformationhttps://www.oreilly.com/search/skills/digital-transformation/
Organizational Leadershiphttps://www.oreilly.com/search/skills/organizational-leadership/
View allhttps://www.oreilly.com/search/skills/business/
Professional Communicationhttps://www.oreilly.com/search/skills/professional-communication/
Emotional Intelligencehttps://www.oreilly.com/search/skills/emotional-intelligence/
Presentation Skillshttps://www.oreilly.com/search/skills/presentation-skills/
Innovationhttps://www.oreilly.com/search/skills/innovation/
Critical Thinkinghttps://www.oreilly.com/search/skills/critical-thinking/
Public Speakinghttps://www.oreilly.com/search/skills/public-speaking/
Collaborationhttps://www.oreilly.com/search/skills/collaboration/
Personal Productivityhttps://www.oreilly.com/search/skills/personal-productivity/
Confidence / Motivationhttps://www.oreilly.com/search/skills/confidence-motivation/
View allhttps://www.oreilly.com/search/skills/soft-skills/
View allhttps://www.oreilly.com/search/skills/
All featureshttps://www.oreilly.com/online-learning/features.html
Verifiable skillshttps://www.oreilly.com/online-learning/verifiable-skills.html
AI Academyhttps://www.oreilly.com/online-learning/ai-academy.html
Courseshttps://www.oreilly.com/online-learning/courses.html
Certificationshttps://www.oreilly.com/online-learning/feature-certification.html
Interactive learninghttps://www.oreilly.com/online-learning/intro-interactive-learning.html
Live eventshttps://www.oreilly.com/online-learning/live-events.html
Superstreamshttps://www.oreilly.com/products/superstreams.html
Answershttps://www.oreilly.com/online-learning/feature-answers.html
Insights reportinghttps://www.oreilly.com/online-learning/insights-dashboard.html
Radar Bloghttps://www.oreilly.com/radar/
Buy Courseshttps://www.oreilly.com/live/
Planshttps://www.oreilly.com/online-learning/pricing.html
Sign Inhttps://www.oreilly.com/member/login/?next=%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Try Nowhttps://www.oreilly.com/online-learning/try-now.html
O'Reilly Platformhttps://www.oreilly.com/member/login/
For Enterprisehttps://www.oreilly.com/online-learning/teams.html
For Governmenthttps://www.oreilly.com/online-learning/government.html
For Higher Edhttps://www.oreilly.com/online-learning/academic.html
For Individualshttps://www.oreilly.com/online-learning/individuals.html
For Marketinghttps://www.oreilly.com/content-marketing-solutions.html
Microsoft Azurehttps://www.oreilly.com/search/skills/microsoft-azure/
Amazon Web Services (AWS)https://www.oreilly.com/search/skills/amazon-web-services-aws/
Google Cloudhttps://www.oreilly.com/search/skills/google-cloud/
Cloud Migrationhttps://www.oreilly.com/search/skills/cloud-migration/
Cloud Deploymenthttps://www.oreilly.com/search/skills/cloud-deployment/
Cloud Platformshttps://www.oreilly.com/search/skills/cloud-platforms/
Data Warehousehttps://www.oreilly.com/search/skills/data-warehouse/
SQLhttps://www.oreilly.com/search/skills/sql/
Apache Sparkhttps://www.oreilly.com/search/skills/apache-spark/
Microsoft SQL Serverhttps://www.oreilly.com/search/skills/microsoft-sql-server/
MySQLhttps://www.oreilly.com/search/skills/mysql/
Kafkahttps://www.oreilly.com/search/skills/kafka/
Data Lakehttps://www.oreilly.com/search/skills/data-lake/
Streaming & Messaginghttps://www.oreilly.com/search/skills/streaming-messaging/
NoSQL Databaseshttps://www.oreilly.com/search/skills/nosql-databases/
Relational Databaseshttps://www.oreilly.com/search/skills/relational-databases/
Pandashttps://www.oreilly.com/search/topics/pandas/
Rhttps://www.oreilly.com/search/topics/r/
MATLABhttps://www.oreilly.com/search/topics/matlab/
SAShttps://www.oreilly.com/search/topics/sas/
D3https://www.oreilly.com/search/topics/d3/
Power BIhttps://www.oreilly.com/search/topics/power-bi/
Tableauhttps://www.oreilly.com/search/topics/tableau/
Statisticshttps://www.oreilly.com/search/topics/statistics/
Exploratory Data Analysishttps://www.oreilly.com/search/topics/exploratory-data-analysis/
Data Visualizationhttps://www.oreilly.com/search/topics/data-visualization/
Generative AIhttps://www.oreilly.com/search/skills/generative-ai/
Machine Learninghttps://www.oreilly.com/search/skills/machine-learning/
Artificial Intelligence (AI)https://www.oreilly.com/search/skills/artificial-intelligence-ai/
Deep Learninghttps://www.oreilly.com/search/skills/deep-learning/
Reinforcement Learninghttps://www.oreilly.com/search/skills/reinforcement-learning/
Natural Language Processinghttps://www.oreilly.com/search/skills/natural-language-processing/
TensorFlowhttps://www.oreilly.com/search/skills/tensorflow/
Scikit-Learnhttps://www.oreilly.com/search/skills/scikit-learn/
Hyperparameter Tuninghttps://www.oreilly.com/search/skills/hyperparameter-tuning/
MLOpshttps://www.oreilly.com/search/skills/mlops/
Javahttps://www.oreilly.com/search/skills/java/
JavaScripthttps://www.oreilly.com/search/skills/javascript/
Springhttps://www.oreilly.com/search/skills/spring/
Pythonhttps://www.oreilly.com/search/skills/python/
Gohttps://www.oreilly.com/search/skills/go/
C#https://www.oreilly.com/search/skills/c-sharp/
C++https://www.oreilly.com/search/skills/c-plus-plus/
Chttps://www.oreilly.com/search/skills/c/
Swifthttps://www.oreilly.com/search/skills/swift/
Rusthttps://www.oreilly.com/search/skills/rust/
Functional Programminghttps://www.oreilly.com/search/skills/functional-programming/
Object-Orientedhttps://www.oreilly.com/search/skills/object-oriented-architecture/
Distributed Systemshttps://www.oreilly.com/search/skills/distributed-systems/
Domain-Driven Designhttps://www.oreilly.com/search/skills/domain-driven-design/
Architectural Patternshttps://www.oreilly.com/search/skills/architectural-patterns/
Kuberneteshttps://www.oreilly.com/search/topics/kubernetes/
Dockerhttps://www.oreilly.com/search/topics/docker/
GitHubhttps://www.oreilly.com/search/topics/github/
Terraformhttps://www.oreilly.com/search/topics/terraform/
Continuous Deliveryhttps://www.oreilly.com/search/topics/continuous-delivery/
Continuous Integrationhttps://www.oreilly.com/search/topics/continuous-integration/
Database Administrationhttps://www.oreilly.com/search/topics/database-administration/
Computer Networkinghttps://www.oreilly.com/search/topics/computer-networking/
Operating Systemshttps://www.oreilly.com/search/topics/operating-systems/
IT Certificationshttps://www.oreilly.com/search/topics/it-certifications/
Network Securityhttps://www.oreilly.com/search/skills/network-security/
Application Securityhttps://www.oreilly.com/search/skills/application-security/
Incident Responsehttps://www.oreilly.com/search/skills/incident-response/
Zero Trust Modelhttps://www.oreilly.com/search/skills/zero-trust-model/
Disaster Recoveryhttps://www.oreilly.com/search/skills/disaster-recovery/
Penetration Testing / Ethical Hackinghttps://www.oreilly.com/search/skills/penetration-testing-ethical-hacking/
Governancehttps://www.oreilly.com/search/skills/governance/
Malwarehttps://www.oreilly.com/search/skills/malware/
Security Architecturehttps://www.oreilly.com/search/skills/security-architecture/
Security Engineeringhttps://www.oreilly.com/search/skills/security-engineering/
Security Certificationshttps://www.oreilly.com/search/skills/security-certifications/
Web Designhttps://www.oreilly.com/search/skills/web-design/
Graphic Designhttps://www.oreilly.com/search/skills/graphic-design/
Interaction Designhttps://www.oreilly.com/search/skills/interaction-design/
Film & Videohttps://www.oreilly.com/search/skills/film-video/
User Experience (UX)https://www.oreilly.com/search/skills/user-experience-ux/
Design Processhttps://www.oreilly.com/search/skills/design-process/
Design Toolshttps://www.oreilly.com/search/skills/design-tools/
Agilehttps://www.oreilly.com/search/skills/agile/
Project Managementhttps://www.oreilly.com/search/skills/project-management/
Product Managementhttps://www.oreilly.com/search/skills/product-management/
Marketinghttps://www.oreilly.com/search/skills/marketing/
Human Resourceshttps://www.oreilly.com/search/skills/human-resources/
Financehttps://www.oreilly.com/search/skills/finance/
Team Managementhttps://www.oreilly.com/search/skills/team-management/
Business Strategyhttps://www.oreilly.com/search/skills/business-strategy/
Digital Transformationhttps://www.oreilly.com/search/skills/digital-transformation/
Organizational Leadershiphttps://www.oreilly.com/search/skills/organizational-leadership/
Professional Communicationhttps://www.oreilly.com/search/skills/professional-communication/
Emotional Intelligencehttps://www.oreilly.com/search/skills/emotional-intelligence/
Presentation Skillshttps://www.oreilly.com/search/skills/presentation-skills/
Innovationhttps://www.oreilly.com/search/skills/innovation/
Critical Thinkinghttps://www.oreilly.com/search/skills/critical-thinking/
Public Speakinghttps://www.oreilly.com/search/skills/public-speaking/
Collaborationhttps://www.oreilly.com/search/skills/collaboration/
Personal Productivityhttps://www.oreilly.com/search/skills/personal-productivity/
Confidence / Motivationhttps://www.oreilly.com/search/skills/confidence-motivation/
All featureshttps://www.oreilly.com/online-learning/features.html
Verifiable skillshttps://www.oreilly.com/online-learning/verifiable-skills.html
AI Academyhttps://www.oreilly.com/online-learning/ai-academy.html
Courseshttps://www.oreilly.com/online-learning/courses.html
Certificationshttps://www.oreilly.com/online-learning/feature-certification.html
Interactive learninghttps://www.oreilly.com/online-learning/intro-interactive-learning.html
Live eventshttps://www.oreilly.com/online-learning/live-events.html
Superstreamshttps://www.oreilly.com/products/superstreams.html
Answershttps://www.oreilly.com/online-learning/feature-answers.html
Insights reportinghttps://www.oreilly.com/online-learning/insights-dashboard.html
Radar Bloghttps://www.oreilly.com/radar/
Buy Courseshttps://www.oreilly.com/live/
Planshttps://www.oreilly.com/online-learning/pricing.html
Sign Inhttps://www.oreilly.com/member/login/?next=%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Try Nowhttps://www.oreilly.com/online-learning/try-now.html
O'Reilly Platformhttps://www.oreilly.com/member/login/
https://www.oreilly.com/content/
AI & MLhttps://www.oreilly.com/radar/topics/ai-ml/
Businesshttps://www.oreilly.com/radar/topics/business/
Datahttps://www.oreilly.com/radar/topics/data/
Innovationhttps://www.oreilly.com/radar/topics/innovation-and-disruption/
Researchhttps://www.oreilly.com/radar/tag/research/
Securityhttps://www.oreilly.com/radar/topics/security/
Start trialhttps://www.oreilly.com/start-trial/?type=team
See what’s coming soonhttps://www.oreilly.com/live/free.html
privacy policyhttp://oreilly.com/oreilly/privacy.html
Contenthttps://www.oreilly.com/content
Topicshttps://www.oreilly.com/content/topics/
Patrick Hallhttps://www.oreilly.com/people/patrick-hall/
LinkedInhttps://www.linkedin.com/feed/?shareActive&mini=true&text=O%E2%80%99Reilly%20-%20Proposals%20for%20model%20vulnerability%20and%20security%20with%20Patrick%20Hall%20-%20https%3A%2F%2Fwww.oreilly.com%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Xhttps://x.com/intent/tweet?original_referer=https%3A%2F%2Fwww.oreilly.com%2F&text=O%E2%80%99Reilly%20-%20Proposals%20for%20model%20vulnerability%20and%20security%20with%20Patrick%20Hall%20-%20https%3A%2F%2Fwww.oreilly.com%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Facebookhttps://www.facebook.com/sharer/sharer.php?quote=O%E2%80%99Reilly%20-%20Proposals%20for%20model%20vulnerability%20and%20security%20with%20Patrick%20Hall%20-%20https%3A%2F%2Fwww.oreilly.com%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Threadshttps://threads.net/intent/post?text=O%E2%80%99Reilly%20-%20Proposals%20for%20model%20vulnerability%20and%20security%20with%20Patrick%20Hall%20-%20https%3A%2F%2Fwww.oreilly.com%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Blueskyhttps://bsky.app/intent/compose?text=O%E2%80%99Reilly%20-%20Proposals%20for%20model%20vulnerability%20and%20security%20with%20Patrick%20Hall%20-%20https%3A%2F%2Fwww.oreilly.com%2Fcontent%2Fproposals-for-model-vulnerability-and-security%2F
Pixabayhttps://pixabay.com/illustrations/hacker-cyber-crime-internet-2300772/
Check out the "Ethics, Security, and Privacy" sessionshttps://conferences.oreilly.com/artificial-intelligence/ai-eu/public/schedule/stopic/3278
disparate impacthttps://en.wikipedia.org/wiki/Disparate_impact
Aequitashttps://github.com/dssg/aequitas
Themishttps://github.com/LASER-UMASS/Themis
AIF360https://github.com/IBM/AIF360
learning fair representationshttps://www.cs.toronto.edu/~toni/Papers/icml-final.pdf
private aggregation of teacher ensembleshttps://openreview.net/pdf?id=rkZB1XbRZ
The Security of Machine Learninghttps://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf
fraud detection modelhttps://medium.com/@curiousily/credit-card-fraud-detection-using-autoencoders-in-keras-tensorflow-for-hackers-part-vii-20e0c85301bd
data integrityhttps://en.wikipedia.org/wiki/Data_integrity
section 1https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F1
surrogate modelhttps://christophm.github.io/interpretable-ml-book/global.html
ProPublicahttps://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
section 1https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F1
section 1https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F1
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
section 2https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F2
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
cleverhanshttps://github.com/tensorflow/cleverhans
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
section 5https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F5
section 3https://www.oreilly.com/ideas/proposals-for-model-vulnerability-and-security#F3
model-agnostic explanation techniqueshttps://christophm.github.io/interpretable-ml-book/agnostic.html
monotonic GBMs (M-GBM)https://github.com/jphall663/interpretable_machine_learning_with_python#enhancing-transparency-in-machine-learning-models-with-python-and-xgboost---notebook
scalable Bayesian rule lists (SBRL)https://arxiv.org/pdf/1602.08610.pdf
eXplainable Neural Networks (XNN)https://arxiv.org/pdf/1806.01933.pdf
model debugginghttps://debug-ml-iclr2019.github.io/
tree SHAPhttps://arxiv.org/pdf/1802.03888.pdf
derivative-based local feature attributionshttps://openreview.net/pdf?id=Sy21R9JAW
https://people.eecs.berkeley.edu/https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf
~https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf
adj/publications/paper-files/SecML-https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf
MLJ2010https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf
.pdfhttps://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf
https://dzone.com/articles/security-attacks-analysis-of-machine-learning-modehttps://dzone.com/articles/security-attacks-analysis-of-machine-learning-mode
https://www.oreilly.com/ideas/you-created-a-machine-learning-application-now-make-sure-its-sechttps://www.oreilly.com/ideas/you-created-a-machine-learning-application-now-make-sure-its-secure
urehttps://www.oreilly.com/ideas/you-created-a-machine-learning-application-now-make-sure-its-secure
https://arxiv.org/pdf/1811.01134.pdfhttps://arxiv.org/pdf/1811.01134.pdf
https://www.cs.cornell.edu/~shmat/shmat_oak17.pdfhttps://www.cs.cornell.edu/~shmat/shmat_oak17.pdf
Artificial Intelligencehttps://www.oreilly.com/content/topics/ai/
https://www.linkedin.com/company/oreilly-media
https://www.youtube.com/user/OreillyMedia
About O'Reillyhttps://www.oreilly.com/about/
Teach/Write/Trainhttps://www.oreilly.com/work-with-us.html
Careershttps://www.oreilly.com/careers/
O'Reilly Newshttps://www.oreilly.com/press/
Media Coveragehttps://www.oreilly.com/press/media-coverage.html
Community Partnershttps://www.oreilly.com/partner/signup.csp
Affiliate Programhttps://www.oreilly.com/affiliates/
Submit an RFPhttps://www.oreilly.com/online-learning/rfp.html
Diversityhttps://www.oreilly.com/diversity/
Content Sponsorshiphttps://www.oreilly.com/content-marketing-solutions.html
Supporthttps://www.oreilly.com/online-learning/support/
Contact Ushttps://www.oreilly.com/about/contact.html
Newslettershttps://www.oreilly.com/emails/newsletters/
Privacy Policyhttps://www.oreilly.com/privacy.html
AI Policyhttps://www.oreilly.com/about/oreilly-approach-to-generative-ai.html
Australia & New Zealandhttps://www.oreilly.com/online-learning/anz.html
Japanhttps://www.oreilly.co.jp/index.shtml
https://itunes.apple.com/us/app/safari-to-go/id881697395
https://play.google.com/store/apps/details?id=com.safariflow.queue
https://channelstore.roku.com/details/c9d25fa651f0ad84e484b0dfd4b20172:856a240ad268961983e91ae52c1e1e5c/oreilly
https://www.amazon.com/OReilly-Media-Inc/dp/B087YYHL5C/ref=sr_1_2?dchild=1&keywords=oreilly&qid=1604964116&s=mobile-apps&sr=1-2
https://www.oreilly.com
Do not sell or share my personal information https://www.oreilly.com/privacy.html?donotsell=show
Terms of Servicehttps://www.oreilly.com/terms/
Privacy Policyhttps://www.oreilly.com/privacy
Editorial Independencehttps://www.oreilly.com/about/editorial_independence.html
Modern Slavery Act Statementhttps://www.oreilly.com/modern-slavery-act-transparency-statement.html

Viewport: width=device-width, initial-scale=1

Robots: max-image-preview:large


URLs of crawlers that visited me.