What if the pre-trained model you downloaded has a hidden backdoor? Learn how to protect your ML systems from these inherited, transferable attacks.
#1about 5 minutes
The dual nature of machine learning's power
Machine learning's increasing power and accessibility, exemplified by complex tasks like panoptic segmentation, also introduces significant security vulnerabilities.
#2about 3 minutes
Accelerating development with transfer learning
Transfer learning allows developers to repurpose large pre-trained teacher models for specific tasks with minimal data and compute by fine-tuning a new student model.
#3about 2 minutes
How transfer learning's benefits create security risks
The core benefits of transfer learning, such as knowledge transfer and minimal training, directly create attack vectors for adversaries.
#4about 5 minutes
Exploring evasion and poisoning attacks in ML
Adversarial examples can fool models with subtle input changes (evasion), while poisoned data can insert hidden backdoors, with both risks amplified by transfer learning.
#5about 3 minutes
Integrating security with a pre-development risk assessment
Before writing code, perform a thorough risk assessment by defining security requirements, evaluating resource availability, and conducting threat modeling for your specific use case.
#6about 3 minutes
Selecting robust teacher models for secure transfer learning
Mitigate risks by choosing transparent and trustworthy teacher models and using robust models hardened through techniques like adversarial training.
#7about 1 minute
Fortifying student models to prevent transferred attacks
Strengthen your student model by fine-tuning all layers to diverge from the teacher model, using backdoor detection, and performing continuous stress testing.
#8about 2 minutes
Key resources for developing secure ML systems
Practical resources like the Adversarial Robustness Toolbox for developers and security principles from the National Cybersecurity Center can help you build more secure ML systems.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
02:17 MIN
New security vulnerabilities and monitoring for AI systems
The State of GenAI & Machine Learning in 2025
05:14 MIN
Challenge three: Ensuring machine learning models are robust
How Machine Learning is turning the Automotive Industry upside down
03:28 MIN
Understanding the fundamental security risks in AI models
Can Machines Dream of Secure Code? Emerging AI Security Risks in LLM-driven Developer Tools
03:05 MIN
Understanding security risks from adversarial attacks on models
Explainable machine learning explained
02:19 MIN
The ethical risks of outdated and insecure AI models
AI & Ethics
09:15 MIN
Navigating the new landscape of AI and cybersecurity
From Monolith Tinkering to Modern Software Development
02:02 MIN
The rapid adoption of LLMs outpaces security practices
ChatGPT, ignore the above instructions! Prompt injection attacks and how to avoid them.
01:21 MIN
Exploring threat modeling frameworks for AI security
A hundred ways to wreck your AI - the (in)security of machine learning systems
MLops – Deploying, Maintaining And Evolving Machine Learning Models in ProductionWelcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Bas Geerdink who gave advice on MLOps.About the speaker:Bas is a programmer, scientist, and IT manager. At ING, he is responsible for the Fast...
Chris Heilmann
Exploring AI: Opportunities and Risks for DevelopersIn today's rapidly evolving tech landscape, the integration of Artificial Intelligence (AI) in development presents both exciting opportunities and notable risks. This dynamic was the focus of a recent panel discussion featuring industry experts Kent...
Daniel Cranney
Panel Discussion: Responsible AI in Practice - Real-World Examples and ChallengesIntroductionIn the ever-evolving landscape of artificial intelligence, the concept of "responsible AI" has emerged as a cornerstone for ethical and practical AI implementation. During the WWC24 Panel discussion, three eminent experts—Mina, Bjorn Brin...
Chris Heilmann
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
From learning to earning
Jobs that call for the skills explored in this talk.