ACM

A developer’s guide to machine learning security

Adversarial attacks are different from other threats programmers face, so they need to understand the weak spots in machine learning.

Leave a Comment

Your email address will not be published. Required fields are marked *