Aggregator
Machine Learning Attack Series: Image Scaling Attacks
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: Some of the attacks I want to investigate, learn about, and try out
A few weeks ago while preparing demos for my GrayHat 2020 - Red Team Village presentation I ran across “Image Scaling Attacks” in Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning by Erwin Quiring, et al.
Closing the Cybersecurity Skills Gap, Part 2
Closing the Cybersecurity Skills Gap, Part 2
Closing the Cybersecurity Skills Gap, Part 2
【VK 技术分享】数据安全怎么做——数据防泄漏
【VK 技术分享】数据安全怎么做——数据防泄漏
【VK 技术分享】数据安全怎么做——数据防泄漏
开源信息收集周报#63
开源信息收集周报#63
开源信息收集周报#63
Harnessing the Momentum of Women in Cybersecurity
This week, some of the brightest subject matter experts from across the U.S. and beyond gathered virtually to talk about women in cybersecurity, recognizing that the internet is filled with both opportunities and risks, and that it’s up to all of us to defend, protect and secure critical internet infrastructure. Called Uniting Women in Cyber […]
The post Harnessing the Momentum of Women in Cybersecurity appeared first on Verisign Blog.