The machine learning pipeline and attacks
infonews
researchsecurity
Source: Embrace The RedSeptember 2, 2020
Summary
This post introduces the machine learning pipeline, which consists of sequential steps from collecting training images, pre-processing data, defining and training a model, evaluating performance, and finally deploying it to production as an API (application programming interface, a way for software to communicate). The author uses a "Husky AI" example application that identifies whether uploaded images contain huskies, and explains that understanding this pipeline's components is important for identifying potential security attacks on machine learning systems.
Classification
Attack SophisticationModerate
Original source: https://embracethered.com/blog/posts/2020/husky-ai-walkthrough/
First tracked: February 12, 2026 at 02:20 PM
Classified by LLM (prompt v3) · confidence: 75%