What are the vectors for unauthorized use of ML model
What are the vectors for unauthorized use of ML model A. The Model and Wights are accessible to the attacker B. Model Endpoint (API) is hacked to access the model without limits C. Model Extraction in which the attacker uses the model to label unlabelled data and generate a surrogate model . Access scenarios for […]
What are the vectors for unauthorized use of ML model Read More »