Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Privacy-Preserving Machine Learning
  • Table Of Contents Toc
  • Feedback & Rating feedback
Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning

By : Srinivasa Rao Aravilli
5 (8)
close
close
Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning

5 (8)
By: Srinivasa Rao Aravilli

Overview of this book

– In an era of evolving privacy regulations, compliance is mandatory for every enterprise – Machine learning engineers face the dual challenge of analyzing vast amounts of data for insights while protecting sensitive information – This book addresses the complexities arising from large data volumes and the scarcity of in-depth privacy-preserving machine learning expertise, and covers a comprehensive range of topics from data privacy and machine learning privacy threats to real-world privacy-preserving cases – As you progress, you’ll be guided through developing anti-money laundering solutions using federated learning and differential privacy – Dedicated sections will explore data in-memory attacks and strategies for safeguarding data and ML models – You’ll also explore the imperative nature of confidential computation and privacy-preserving machine learning benchmarks, as well as frontier research in the field – Upon completion, you’ll possess a thorough understanding of privacy-preserving machine learning, equipping them to effectively shield data from real-world threats and attacks
Table of Contents (17 chapters)
close
close
Free Chapter
1
Part 1: Introduction to Data Privacy and Machine Learning
4
Part 2: Use Cases of Privacy-Preserving Machine Learning and a Deep Dive into Differential Privacy
8
Part 3: Hands-On Federated Learning
11
Part 4: Homomorphic Encryption, SMC, Confidential Computing, and LLMs

AI standards and terminology of attacks

In the following section, we will go through some AI standards and terminology of attacks.

NIST

NIST Trustworthy and Responsible AI released a paper on taxonomy and terminologies used in AI with respect to attacks and mitigations. It covers both predictive AI (traditional ML) and GenAI.

Figure 10.4 – Taxonomy of attacks on Generative AI systems

Figure 10.4 – Taxonomy of attacks on Generative AI systems

Image source: “Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations ” paper from NIST. https://doi.org/10.6028/NIST.AI.100-2e2023

OWASP Top 10 for LLM applications

The OWASP Top 10 for Large Language Model Applications project aims to educate developers, designers, architects, managers, and organizations about the potential security risks when deploying and managing LLMs. The OWASP Top 10 for LLM applications are as follows.

  • LLM01: Prompt Injection
  • LLM02: Insecure Output Handling
  • LLM03: Training...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY