Total visitors | 28 | 28 more than previous period |
---|---|---|
Total pageviews | 190 | 190 more than previous period |
Realtime pageviews | 0 | pageviews in the last hour |
# | Pages | Visitors | Pageviews |
---|---|---|---|
1 | Cover | 20 | 47 |
2 | Acknowledgements | 14 | 26 |
3 | 1.2 Adversarial Attack Types: Model Processing and Development | 3 | 12 |
4 | 1.5 Key Concepts in Machine Learning Security | 2 | 7 |
5 | 1.8 End of Chapter Activities | 2 | 6 |
6 | 1.1 Introduction to Machine Learning Security | 1 | 5 |
7 | 1.6 Challenges in Securing Machine Learning Systems | 1 | 5 |
8 | 3.9 End of Chapter Activities | 1 | 5 |
9 | 1.3 Adversarial Attack Types: Knowledge of Adversary | 1 | 4 |
10 | 1.4 Adversarial Attack Types: Capability and Intention of the Adversary. | 1 | 4 |
11 | 2.9 End of Chapter Activities | 1 | 4 |
12 | 6.5 End of Chapter Activities | 1 | 4 |
13 | Chapter 1: Introduction to Machine Learning Security and Challenges | 2 | 3 |
14 | 2.4 Adversary’s Model and Attack Scenario | 1 | 3 |
15 | 2.5 Attack Scenarios | 1 | 3 |
16 | 4.6 End of Chapter Activities | 1 | 3 |
17 | 5.8 End of Chapter Activities | 1 | 3 |
18 | 6.1 Introduction | 1 | 3 |
19 | 1.0 Learning Outcomes | 2 | 2 |
20 | 2.2 Categories of Attacks | 1 | 2 |
# | Referrers | Visitors | Pageviews |
---|---|---|---|
1 | statics.teams.cdn.office.net | 7 | 9 |
2 | ecampusontario.pressbooks.pub/wp/wp-admin/network/admin.php | 3 | 5 |