Total visitors | 59 +40% | 17 more than previous period |
---|---|---|
Total pageviews | 125 -42% | 90 less than previous period |
Realtime pageviews | 0 | pageviews in the last hour |
# | Pages | Visitors | Pageviews |
---|---|---|---|
1 | Cover | 52 | 80 |
2 | Acknowledgements | 12 | 12 |
3 | Chapter 1: Introduction to Machine Learning Security and Challenges | 3 | 4 |
4 | 1.0 Learning Outcomes | 3 | 4 |
5 | 1.1 Introduction to Machine Learning Security | 3 | 4 |
6 | 4.3 Attack Method and Examples | 2 | 3 |
7 | Version History | 1 | 2 |
8 | 2.5 Attack Scenarios | 2 | 2 |
9 | 1.7 Chapter Summary | 1 | 1 |
10 | 1.2 Adversarial Attack Types: Model Processing and Development | 1 | 1 |
11 | 1.4 Adversarial Attack Types: Capability and Intention of the Adversary. | 1 | 1 |
12 | Chapter 3: Evasion Attack (Adversarial Examples) | 1 | 1 |
13 | 4.0 Learning Outcomes | 1 | 1 |
14 | 4.4 Mitigating Poisoning Attacks | 1 | 1 |
15 | 3.4 Distance Metrics of Adversarial Perturbations | 1 | 1 |
16 | 5.0 Learning Outcomes | 1 | 1 |
17 | 5.2 How Backdoor Poisoning Works | 1 | 1 |
18 | 5.7 Chapter Summary | 1 | 1 |
19 | Chapter 6: Privacy Attack | 1 | 1 |
20 | 6.1 Introduction | 1 | 1 |
# | Referrers | Visitors | Pageviews |
---|---|---|---|
1 | linkedin.com | 14 | 19 |
2 | pressbooks.directory | 2 | 3 |
3 | google.com | 2 | 3 |
4 | Android app: com.linkedin.android | 2 | 2 |
5 | search.fanshawelibrary.ca | 1 | 1 |