Watch this video on YouTube
How can an attacker exploit an AI system's reliance on data by altering the data flow without direct access to the model?