
·AI Security
Module 18 Lesson 2: Model Inversion
Re-creating the secret. Learn how attackers use 'Model Inversion' to reconstruct raw images and text from a machine learning model's output.
2 articles

Re-creating the secret. Learn how attackers use 'Model Inversion' to reconstruct raw images and text from a machine learning model's output.

Reverse-engineering the training set. Learn how attackers work backwards from a model's outputs to reconstruct the sensitive images or text used in training.