Part 2 – Creating a Secure System Using ML

This part challenges the assumption that only data scientists work with ML applications by reviewing the topic of ML security from a number of perspectives, especially from that of researchers.

This section includes the following chapters:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.197.212