August 2019
Intermediate to advanced
342 pages
9h 35m
English
In Chapter 8, GANs – Attacks and Defenses, we showed how to use Generative Adversarial Networks (GANs) to deceive detection algorithms. Now, we will see that, it is not only GANs that pose a threat to our AI-based cybersecurity solutions, but more generally, it is possible to exploit Reinforcement Learning (RL) to render our detection tools ineffective.
To understand how, we need to briefly introduce the fundamental concepts of RL.
Read now
Unlock full access