Total visitors | 67 +139% | 39 more than previous period |
---|---|---|
Total pageviews | 140 -26% | 50 less than previous period |
Realtime pageviews | 0 | pageviews in the last hour |
# | Pages | Visitors | Pageviews |
---|---|---|---|
1 | Cover | 61 | 92 |
2 | Acknowledgements | 18 | 18 |
3 | Chapter 1: Introduction to Machine Learning Security and Challenges | 4 | 5 |
4 | 1.0 Learning Outcomes | 3 | 4 |
5 | 1.1 Introduction to Machine Learning Security | 3 | 4 |
6 | Version History | 1 | 2 |
7 | 1.7 Chapter Summary | 1 | 1 |
8 | 1.6 Challenges in Securing Machine Learning Systems | 1 | 1 |
9 | 1.2 Adversarial Attack Types: Model Processing and Development | 1 | 1 |
10 | 1.4 Adversarial Attack Types: Capability and Intention of the Adversary. | 1 | 1 |
11 | Chapter 3: Evasion Attack (Adversarial Examples) | 1 | 1 |
12 | 4.0 Learning Outcomes | 1 | 1 |
13 | 4.3 Attack Method and Examples | 1 | 1 |
14 | 4.4 Mitigating Poisoning Attacks | 1 | 1 |
15 | 3.4 Distance Metrics of Adversarial Perturbations | 1 | 1 |
16 | 5.0 Learning Outcomes | 1 | 1 |
17 | 5.2 How Backdoor Poisoning Works | 1 | 1 |
18 | 5.7 Chapter Summary | 1 | 1 |
19 | Chapter 6: Privacy Attack | 1 | 1 |
20 | 6.1 Introduction | 1 | 1 |
# | Referrers | Visitors | Pageviews |
---|---|---|---|
1 | linkedin.com | 20 | 26 |
2 | Android app: com.linkedin.android | 4 | 6 |
3 | pressbooks.directory | 2 | 3 |
4 | google.com | 2 | 3 |
5 | yandex.ru | 1 | 1 |
6 | search.fanshawelibrary.ca | 1 | 1 |