"

3.0 Learning Outcomes

Learning Outcomes

By the end of this chapter, students will be able to:

  • Define and explain evasion attacks.
  • Differentiate between key adversarial attack types.
  • Analyze real-world implications of adversarial examples.
  • Describe common adversarial attack methods.
  • Explain distance metrics used in adversarial perturbations.
  • Evaluate defence mechanisms against evasion attacks.

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Winning the Battle for Secure ML Copyright © 2025 by Bestan Maaroof is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.