category
AI Security Techniques
Ways AI systems can be attacked or misused, with examples and defenses.
Showing 1-20 of 170 records
AI attack method AML.T0112.001; evidence level: feasible; 5 related AI risks
AI attack method AML.T0034.001; evidence level: feasible; 4 related AI risks
AI attack method AML.T0034.000; evidence level: feasible
AI attack method AML.T0008.004; evidence level: feasible; 2 related AI risks
AI attack method AML.T0000.002; evidence level: feasible; 5 related AI risks
AI attack method AML.T0000.000; evidence level: feasible; 2 related AI risks
AI attack method AML.T0005.002; evidence level: feasible; 1 mitigations; 3 related AI risks
AI attack method AML.T0010.000; evidence level: feasible; 23 related AI risks
AI attack method AML.T0052.001; evidence level: feasible; 2 mitigations; 5 related AI risks
AI attack method AML.T0046; evidence level: feasible; 2 mitigations; 3 related AI risks
AI attack method AML.T0034; evidence level: feasible; 2 mitigations
AI attack method AML.T0024.001; evidence level: feasible; 3 mitigations; 5 related AI risks
AI attack method AML.T0024.000; evidence level: feasible; 3 mitigations; 5 related AI risks
AI attack method AML.T0014; evidence level: feasible; 3 mitigations; 5 related AI risks
AI attack method AML.T0091; evidence level: demonstrated; 4 related AI risks
AI attack method AML.T0084; evidence level: demonstrated; 5 related AI risks
AI attack method AML.T0069; evidence level: demonstrated; 5 related AI risks
AI attack method AML.T0106; evidence level: demonstrated; 1 case studies; 3 related AI risks
AI attack method AML.T0100; evidence level: demonstrated; 1 case studies; 5 related AI risks
AI attack method AML.T0095.000; evidence level: demonstrated; 1 case studies; 5 related AI risks