article thumbnail

Proposals for model vulnerability and security

O'Reilly on Data

Data integrity constraints: Many databases don’t allow for strange or unrealistic combinations of input variables and this could potentially thwart watermarking attacks. Applying data integrity constraints on live, incoming data streams could have the same benefits. 2010): 121-148. Barreno, Marco, et al.

Modeling 222