Title: Proposals for model vulnerability and security – O’Reilly
Open Graph Title: Proposals for model vulnerability and security
X Title: Proposals for model vulnerability and security
Description: Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.
Open Graph Description: Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.
X Description: Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors.
Opengraph URL: https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/
Domain: www.oreilly.com
{
"@context": "https://schema.org",
"@type": "BreadcrumbList",
"itemListElement": [
{
"@type": "ListItem",
"position": 1,
"name": "O'Reilly",
"item": "https://www.oreilly.com/"
},
{
"@type": "ListItem",
"position": 2,
"name": "Radar",
"item": "https://www.oreilly.com/radar/"
},
{
"@type": "ListItem",
"position": 3,
"name": "Proposals for model vulnerability and security",
"item": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/"
}
]
}
{
"@context": "https://schema.org",
"@type": "BlogPosting",
"@id": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/#BlogPosting",
"mainEntityOfPage": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/",
"headline": "Proposals for model vulnerability and security",
"description": "Like many others, I’ve known for some time that machine learning models themselves could pose security risks. A recent flourish of posts and papers has outlined the broader topic, listed attack vectors and vulnerabilities, started to propose defensive solutions, and provided the necessary framework for this post. The objective here is to brainstorm on potential …",
"image": {
"@type": "ImageObject",
"url": "https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg"
},
"author": [
{"@type": "Person", "name": "Patrick Hall", "url": "https://www.oreilly.com/people/patrick-hall/"} ],
"publisher": {
"@type": "Organization",
"name": "O'Reilly Media",
"url": "https://www.oreilly.com/",
"logo": {
"@type": "ImageObject",
"url": "https://cdn.oreillystatic.com/images/sitewide-headers/oreilly_logo_mark_red.svg",
"width": 200,
"height": 50
}
},
"datePublished": "2019-03-20",
"dateModified": "2019-03-20",
"wordCount": "4210",
"timeRequired": "PT22M",
"keywords": [],
"genre": ["Artificial Intelligence"],
"isPartOf": {
"@type": "Blog",
"name": "O'Reilly Radar",
"url": "https://www.oreilly.com/radar/"
},
"potentialAction": {
"@type": "ViewAction",
"target": "https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security/",
"name": "Read Full Article"
}
}
| msapplication-TileImage | https://www.oreilly.com/content/wp-content/uploads/sites/2/2025/04/cropped-favicon_512x512-270x270.png |
| None | IE=edge |
| language_name | English |
| native_language_name | English |
| format-detection | telephone=no |
| twitter:card | summary_large_image |
| twitter:url | https://www.oreilly.com/content/proposals-for-model-vulnerability-and-security |
| twitter:image | https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg |
| og:type | article |
| og:site_name | O’Reilly Media |
| og:image | https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg |
| author | Patrick Hall |
| description:site | Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors. |
| article:published_time | 2019-03-20T14:50:00-04:00 |
| article:author | Patrick Hall |
| date | 2019-03-20 |
| thumbnail | https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg |
| graphic_medium | https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/hacker-2300772_1920_crop-1c6f25bf5f4a7ac71da63601449be88b-1024x695.jpg |
| oreilly:content_type | text |
Links:
Viewport: width=device-width, initial-scale=1
Robots: max-image-preview:large