Adversarial Example Susceptibility

From The Foundation for Best Practices in Machine Learning
Technical Best Practices > Security > Adversarial Example Susceptibility

Adversarial Example Susceptibility

Control

If sufficient potential motives have been determined for adversarial attack, document and assess the specific susceptibility of Models to Adversarial Examples by considering - (a) sparse or empty regions of the input space, and/or (b) Model architectures; in addition to the general Susceptibility Assessment. Document and implement specific protective measures, such as but not limited to adversarial training.


Aim

To (a) warrant the control of the risk of Evasion Attacks, specifically Adversarial Examples; and (b) highlight associated risks that might occur in the Product Lifecycle.


Additional Information