Overview
Explore cutting-edge techniques for detecting AI trojans through meta neural analysis in this 15-minute IEEE presentation. Delve into the intricacies of IntroJumbo Learning, Feature Extraction, and Query Tuning while examining the RTR Attack and Adaptive Attack methodologies. Gain valuable insights into advanced cybersecurity measures for protecting artificial intelligence systems from malicious intrusions.
Syllabus
Intro
Jumbo Learning
Feature Extraction
Query Tuning
RTR Attack
Adaptive Attack
Taught by
IEEE Symposium on Security and Privacy