Aggregator
腾讯代码安全检查Xcheck
腾讯代码安全检查Xcheck
Machine Learning Attack Series: Perturbations to misclassify existing images
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: The attacks I want to investigate, learn about, and try out
The previous post covered some neat smart fuzzing techniques to improve generation of fake husky images.
The goal of this post is to take an existing image of the plush bunny below, modify it and have the model identify it as a husky.
Maximizing Qname Minimization: A New Chapter in DNS Protocol Evolution
Data privacy and security experts tell us that applying the “need to know” principle enhances privacy and security, because it reduces the amount of information potentially disclosed to a service provider — or to other parties — to the minimum the service provider requires to perform a service. This principle is at the heart of […]
The post Maximizing Qname Minimization: A New Chapter in DNS Protocol Evolution appeared first on Verisign Blog.