June 2026
Intermediate
392 pages
11h 24m
English
Technologies that use AI are facing new kinds of attacks. In recent years, criminals have leaked records and stolen money from the Shanghai and California tax departments by deceiving their facial recognition authentication models. They’ve poisoned malware classifiers provided by McAfee and Cylance by manipulating the data submitted to them. And incident repositories have documented hundreds of other AI attacks.
In this chapter, we’ll start with the basics of how machines can learn by themselves, a concept that underpins every discussion that follows. We’ll use code and first-principles logic to show not only how machines learn ...
Read now
Unlock full access