ML Security Flashcards
(193 cards)
-Science of making things smart or human tasks performed by machines (example: visual recognition, Natural Language processing)
A. Artificial Intelligence (AI)
B. Machine Learning (ML)
C. Deep Learning (DL)
A. Artificial Intelligence - Science of making things smart or human tasks performed by machines (example: visual recognition, Natural Language processing) Ability of machines to perform human tasks.
-One of many approaches to AI that uses a system capable of learning from experience. Makes decisions based on data rather than algorithm.
A. Artificial Intelligence (AI)
B. Machine Learning (ML)
C. Deep Learning (DL)
B. Machine Learning (ML)
-One of many approaches to AI that uses a system capable of learning from experience. Makes decisions based on data rather than algorithm.
-A set of techniques for implementing machine learning that recognizes patterns of patterns. (for example: image recognition). Identifies object boundary, type, structure.
A. Artificial Intelligence (AI)
B. Machine Learning (ML)
C. Deep Learning (DL)
C. Deep Learning (DL)
A set of techniques for implementing machine learning that recognizes patterns of patterns. (for example: image recognition)
Different applications work with different data.
What is an AI Threat?
A. Hacker break system through stickers on stop signs
B. Hackers can bypass facial recogniton
C. Hackers can break web platforms and filters via social media.
D. Hackers like Nest Assistance can be broken
E. All the above
E. All the above are AI Threats.
a. Self Driving Car Threat:
Hacker break system through stickers on stop signs
b. Classification / Image Threat:
Hackers can bypass facial recogniton
c. Social Media Threat:
Hackers can break web platforms and filters via social media.
d. Home Automation Threat:
Hackers like Nest Assistance can be broken
What algorithm categories are the following categories?
-Classification
-Regression
A. Supervised
B. Unsupervised
C. Semi-Supervised
D. Reinforcement Learning
-Classification
-Regression
A. Supervised
What algorithm categories are the following categories?
-Clustering
-Dimensionality Reduction
A. Supervised
B. Unsupervised
C. Semi-Supervised
D. Reinforcement Learning
-Clustering
-Dimensionality Reduction
B. Unsupervised
What algorithm categories are the following categories?
-Generative models
A. Supervised
B. Unsupervised
C. Semi-Supervised
D. Reinforcement Learning
-Generative models
C. Semi-Supervised
What algorithm categories are the following categories?
-reinforcement learning
D. Reinforcement Learning
-reinforcement learning
D. Reinforcement Learning
How are AI attacks classified?
A. confidentiality, availability, and integrity (triad)
B. Espionage, sabotage, and fraud
C. Availability, fraud, and integrity
D.A and B
How AI attacks classified
A. confidentiality, availability, and integrity (triad)
and
B. Espionage, sabotage, and fraud
What are the steps to start an AI Security Project?
I. Identify an AI object and a task
ii. understand algorithm category and algorithm itself
iii. choose an ai attack relevant to your task and algorithm
A. 3,2,1
B. 2,1,3
C. 1,2,3
D. 3,1,2
Start and AI Security Project Steps:
C. 1,2,3
I. Identify an AI object and a task
ii. understand algorithm category and algorithm itself
iii. choose an ai attack relevant to your task and algorithm
True or False:
AI Threats are similar / mostly the same, but their appraoches are different
True
AI Threats are similar / mostly the same, but their appraoches are different
Reasoning: The difference comes in Algorithms
Steps to Set up your Environment:
i. have nvidia gpu or not
ii. choose operating system (recommend Ubuntu)
iii. follow guidelines provided
A. 3,2,1
B. 1,2,3
C. 2, 1, 3,
D. 3,1,2,
Steps to Set up your Environment:
i. have nvidia gpu or not
ii. choose operating system (recommend Ubuntu)
iii. follow guidelines provided
B. 1,2,3
Which attack cannot be used for breaking integrity of AI?
A. backdoor
b. adversarial
c. inference attack
d. poisoning
c. inference attack
inference attack- dont break functionality they extract critical data
REASONING:
Adversarial attacks- break integrity by misclassification
Poisoning - poisoning breaks integrity
Backdoor-backdoor attacks break integrtiy
What is the most important hardware for this course?
a. CPU
b. GPU
c. RAM
d. HDD
most important hardware
b. GPU
Model is getting trained on label data set. Examples is Classification and regression:
A. Supervised
B. Unsupervised
C. Semi-Supervised
D. Reinforcement Learning
A. Supervised
Supervised- Model is getting trained on label data set. Examples is Classification and regression.
Model is attempting to automatically find structure in the data by extracting useful features and analyzing its structure. Examples: Clustering, Association, Dimension Reduction (Generalization)
A. Supervised
B. Unsupervised
C. Semi-Supervised
D. Reinforcement Learning
B. Unsupervised
Unsupervised - Model is attempting to automatically find structure in the data by extracting useful features and analyzing its structure. Examples: Clustering, Association, Dimension Reduction (Generalization)
Imagine a road sign detection system aiming to classify signs. Supervised learning approach is usually used. Examples of certain groups is known and all classes should be defined in the beginning. This method is:
A. Classification
B. Regression
C. Clustering
A. Classification
Classification - imagine a road sign detection system aiming to classify signs. Supervised learning approach is usually used. Examples of certain groups is known and all classes should be defined in the beginning.
The knowledge about the existing data is utilized to have an idea about new data (Past explains future). Ex. is stock price prediction.
A. Classification
B. Regression
C. Clustering
B. Regression
Regression - The knowledge about the existing data is utilized to have an idea about new data (Past explains future). Ex. is stock price prediction.
Supervised learning approach is usually used. Examples of certain groups is known and information about classes in data is unknown.
A. Classification
B. Regression
C. Clustering
C. Clustering
Clusteirng - Supervised learning approach is usually used. Examples of certain groups is known and information about classes in data is unknown.
Algorithms: KNN (K-Nearest Neighbor), K-Means, Mixture Model (LDA)
Necessary if you deal with complex systems with unlabeled data and many potential features (facial recogntion)
A. Classification
B. Dimension Reduction (Generalization)
C. Clustering
D. Generative Models
B. Dimension Reduction (Generalization)
Dimension Reduction - Necessary if you deal with complex systems with unlabeled data and many potential features (facial recogntion)
_______ designed to stimulate the actual data and not decisions, based on previous data.
AI data based on previous data.
A. Classification
B. Dimension Reduction (Generalization)
C. Clustering
D. Generative Models
D. Generative Models
Generative Models - AI data based on previous data. designed to stimulate the actual data and not decisions, based on previous data.
________ A behavior that depends on the changing environment.
A. Reinforcement Learning
B. Dimension Reduction (Generalization)
C. Active Learning
D. Generative Models
A. Reinforcement Learning -A behavior that depends on the changing environment.
Reinforcement Learning
(Behavior should react to the changing environment. Trial and Error.)
_____ A subclass of reinforcement learning, which helps correct errors, in addition to the environment changes
A. Reinforcement Learning
B. Dimension Reduction (Generalization)
C. Active Learning
D. Generative Models
C. Active Learning
Active Learning - A subclass of reinforcement learning, which helps correct errors, in addition to the environment changes
Acts as a teacher who can help correct errors in addition to environment changes