Filtering Susceptibility

From The Foundation for Best Practices in Machine Learning
Technical Best Practices > Security > Filtering Susceptibility

Filtering Susceptibility

Control

If sufficient potential motive has been determined for adversarial attack, document and assess the specific susceptibility of the pre-processing filtering procedures of Models being evaded by tailored inputs, based on the information available to an adversarial attacker about these procedures; in addition to the general Susceptibility Assessment. Increase the robustness of this filtering as far as practically feasible.


Aim

To (a) warrant the control of the risk of Evasion and Sabotage Attacks, including Adversarial Examples; and (b) highlight associated risks that might occur in the Product Lifecycle.


Additional Information