
Adversarial Machine Learning
The Data Exchange with Ben Lorica
00:00
Data Poisoning of Textual Data Set
iac looks at this problem as an analogueto, asiber security problem. There is number of abilties and their number of interventions. And none of the interventions are perfect. So it ruly requires a comprehensive approach to to addressing the problem itself. I'm going to just tried to so i now n my my brain is headed towards kind of more of the industrial examples,. Like starsnet write, so where is m l being used in industrial sector? I don't know. But when i was from the airport up to one o one to the dantan, san francisco, on the left and right ther bill boards. And every billboard is advertising a i for cider
Transcript
Play full episode