How can an attacker exploit an AI system's eccouncil video
ethical-hacker video for how can an attacker exploit an AI system's reliance on data by altering the data flow without direct access to the model?
Answer
          Full Certification Question
How can an attacker exploit an AI system's reliance on data by altering the data flow without direct access to the model?