This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
How attackers determine if specific data points were used in training by querying model outputs and observing confidence scores.
You've completed the free preview. Subscribe to unlock every lesson in every course.