My Unique Perspective
My unique perspective emerges from synthesizing seemingly disparate fields into coherent narratives of technological transformation.
The concept of the backdoor, or “trojan”, AI attack was first…
Read MoreIntroduction Gradient and Update Leakage attacks intercept and analyze gradient updates…
Read MoreIntroduction AI model extraction refers to an attack method where an…
Read MoreIntroduction Model Extraction Attacks aim at stealing model architecture, training hyperparameters, learned…
Read MoreIntroduction Alignment-Aware Extraction goes beyond conventional extraction methods by strategically capturing both the…
Read MoreIntroduction Cloud infrastructure vulnerabilities comprise security weaknesses in the cloud platforms…
Read MoreIntroduction Model Deployment Vulnerabilities are weaknesses in how models are deployed…
Read MoreIntroduction Equation-Solving Attacks represent a specialized and powerful subset of extraction…
Read MoreIntroduction Model Leeching is a Model Extraction attack in which an adversary siphons…
Read MoreIntroduction API Querying is a systematic approach where attackers send repeated…
Read More