Record summary
A quick snapshot of what this page covers.
Techniques2Attack methods connected to this risk.
Mitigations8Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain4. Malicious Actors & Misuse
Subdomain4.1 > Disinformation, surveillance, and influence at scale
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryManipulation
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
Passive AI Output Obfuscation
DeploymentML Model Evaluation
Model Hardening
Data PreparationML Model Engineering
Restrict Number of AI Model Queries
Business and Data UnderstandingDeployment+1 more
Use Ensemble Methods
ML Model Engineering
Validate AI Model
ML Model EvaluationMonitoring and Maintenance
Input Restoration
Data PreparationML Model Evaluation+2 more
Adversarial Input Detection
Data PreparationML Model Engineering+3 more
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
Source
Research source for this risk, when available.
Included resource
A framework for ethical AI at the United Nations
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
