Table of Contents
- Getting Started with AI
- Building Our Adversarial Playground
- Security and Adversarial AI
- Poisoning Attacks
- Model Tampering with Trojan Horses and Model Reprogramming
- Supply Chain Attacks and Adversarial AI
- Evasion Attacks against Deployed AI
- Privacy Attacks – Stealing Models
- Privacy Attacks – Stealing Data
- Privacy-Preserving AI
- Generative AI – A New Frontier
- Weaponizing GANs for Deepfakes and Adversarial Attacks
- LLM Foundations for Adversarial AI
- Adversarial Attacks with Prompts
- Poisoning Attacks and LLMs
- Advanced Generative AI Scenarios
- Secure by Design and Trustworthy AI
- AI Security with MLSecOps
- Maturing AI Security

