Total visitors | 42 | 42 more than previous period |
---|---|---|
Total pageviews | 215 | 215 more than previous period |
Realtime pageviews | 0 | pageviews in the last hour |
# | Pages | Visitors | Pageviews |
---|---|---|---|
1 | Cover | 31 | 63 |
2 | Acknowledgements | 20 | 32 |
3 | 1.2 Adversarial Attack Types: Model Processing and Development | 3 | 12 |
4 | 1.5 Key Concepts in Machine Learning Security | 2 | 7 |
5 | 1.8 End of Chapter Activities | 2 | 6 |
6 | 1.6 Challenges in Securing Machine Learning Systems | 2 | 6 |
7 | 1.1 Introduction to Machine Learning Security | 1 | 5 |
8 | 3.9 End of Chapter Activities | 1 | 5 |
9 | Chapter 1: Introduction to Machine Learning Security and Challenges | 3 | 4 |
10 | 1.3 Adversarial Attack Types: Knowledge of Adversary | 1 | 4 |
11 | 1.4 Adversarial Attack Types: Capability and Intention of the Adversary. | 1 | 4 |
12 | 2.9 End of Chapter Activities | 1 | 4 |
13 | 6.5 End of Chapter Activities | 1 | 4 |
14 | 2.4 Adversary’s Model and Attack Scenario | 1 | 3 |
15 | 2.5 Attack Scenarios | 1 | 3 |
16 | 4.6 End of Chapter Activities | 1 | 3 |
17 | 5.8 End of Chapter Activities | 1 | 3 |
18 | 6.1 Introduction | 1 | 3 |
19 | 1.0 Learning Outcomes | 2 | 2 |
20 | 2.2 Categories of Attacks | 1 | 2 |
# | Referrers | Visitors | Pageviews |
---|---|---|---|
1 | statics.teams.cdn.office.net | 7 | 9 |
2 | linkedin.com | 6 | 7 |
3 | ecampusontario.pressbooks.pub/wp/wp-admin/network/admin.php | 3 | 5 |
4 | Android app: com.linkedin.android | 3 | 5 |
5 | yandex.ru | 1 | 1 |