Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore techniques for subverting machine learning detections in this 41-minute conference talk from DerbyCon 4. Learn about potential vulnerabilities in ML systems and strategies for exploiting them, as presented by cybersecurity experts Ram Shankar Siva Kumar and John Walton. Gain insights into the intersection of machine learning and security, and understand how attackers might attempt to bypass ML-based detection mechanisms.