Author name: Rishabh

Generative Adversarial Networks (GANs) From Scratch

Generative Adversarial Networks (GANs) are incredibly powerful in the world of machine learning. They excel at creating synthetic data that’s so close to real data, it’s almost uncanny. Today, we’re diving into how these networks work and even trying our hand at building a simple GAN framework using PyTorch. But why the term “Adversarial”? Well, …

Generative Adversarial Networks (GANs) From Scratch Read More »

What is Federated Learning

With the concerns about data privacy rising and with the rise of AI models, people are increasingly concerned about their data being misused for purposes beyond their consent. As we know that data is the new oil of this century, it is a very sought after commodity. Seeing these concerns, Google introduced the concept of …

What is Federated Learning Read More »

Universal Backdoor Attacks

Today I will be discussing my understanding of the paper Universal Backdoor Attacks. The paper delves into another exciting exploit that can be leveraged against popular convolutional models such as Resnets. What is a Universal Backdoor A backdoor is an alternate entry to your house. In the field of computers and security in general, it …

Universal Backdoor Attacks Read More »

BIM: Advanced FSGM Attack

Previously we talked about Fast Sign Gradient Method( FGSM), we saw how this white box technique, cleverly exploits the gradients in a model, to perturb the input to give the wrong prediction from the model. Since, in this method, we perturb our input just once, a modified version of this attack does so repeatedly for …

BIM: Advanced FSGM Attack Read More »

Adversarial Attacks

In this post, we will be talking about the vulnerabilities that plague machine learning. Yes, in the realm of computer science, no field is void of vulnerabilities and loopholes and as we progress towards a very AI-based future, the security and robustness of machine learning models become an important aspect. What are Adversarial Attacks? The …

Adversarial Attacks Read More »

Scroll to Top