You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/glossary.md
+44-11Lines changed: 44 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,23 +53,34 @@ comments: false
53
53
54
54
## A {#a}
55
55
56
-
[]()
56
+
57
+
[Adversarial attack](#adversarial_attack)
58
+
Type of attack which seeks to trick machine learning models into misclassifying inputs by maliciously tampering with input data
57
59
58
60
## B {#b}
59
61
60
62
[]()
61
63
62
64
## C {#c}
63
65
64
-
[]()
66
+
[Classification](#classification)
67
+
Process of arranging things in groups which are distinct from each other, and are separated by clearly determined lines of demarcation
65
68
66
69
## D {#d}
67
70
68
-
[]()
71
+
[Data labeling](#data_labeling)
72
+
Process of assigning tags or categories to each data point in a dataset
73
+
74
+
[Data poisoning](#data_poisoning)
75
+
Type of attack that inject poisoning samples into the data
76
+
77
+
[Deep learning](#deep_learning)
78
+
Family of machine learning methods based on artificial neural networks with long chains of learnable causal links between actions and effects
69
79
70
80
## E {#e}
71
81
72
-
[]()
82
+
[Ensemble](#ensemble)
83
+
See: [Model Ensemble](#model_ensemble)
73
84
74
85
## F {#f}
75
86
@@ -85,7 +96,14 @@ comments: false
85
96
86
97
## I {#i}
87
98
88
-
[]()
99
+
[Input Validation](#input_validation)
100
+
Input validation is a technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the code, or when communicating with other components
101
+
102
+
[Intrusion Detection Systems (IDS)](#ids)
103
+
Security service that monitors and analyzes network or system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner
104
+
105
+
[Intrusion Prevention System (IPS)](#ips)
106
+
System that can detect an intrusive activity and can also attempt to stop the activity, ideally before it reaches its targets
89
107
90
108
## J {#j}
91
109
@@ -101,39 +119,54 @@ comments: false
101
119
102
120
## M {#m}
103
121
104
-
[]()
122
+
[MLOps](#mlops)
123
+
The selection, application, interpretation, deployment, and maintenance of machine learning models within an AI-enabled system
124
+
125
+
[Model](#model)
126
+
Detailed description or scaled representation of one component of a larger system that can be created, operated, and analyzed to predict actual operational characteristics of the final produced component
127
+
128
+
[Model ensemble](#model_ensemble)
129
+
Art of combining a diverse set of learners (individual models) together to improvise on the stability and predictive power of the model
105
130
106
131
## N {#n}
107
132
108
133
[]()
109
134
110
135
## O {#o}
111
136
112
-
[]()
137
+
[Obfuscation](#obfuscation)
138
+
Defense mechanism in which details of the model or training data are kept secret by adding a large amount of valid but useless information to a data store
139
+
140
+
[Overfitting](#overfitting)
141
+
Overfitting is when a statistical model begins to describe the random error in the data rather than the relationships between variables. This occurs when the model is too complex
113
142
114
143
## P {#p}
115
144
116
-
[]()
145
+
[Perturbation](#perturbation)
146
+
Noise added to an input sample
117
147
118
148
## Q {#q}
119
149
120
150
[]()
121
151
122
152
## R {#r}
123
153
124
-
[]()
154
+
[Regularisation](#regularisation)
155
+
Controlling model complexity by adding information in order to solve ill-posed problems or to prevent overfitting
125
156
126
157
## S {#s}
127
158
128
-
[]()
159
+
[Spam](#spam)
160
+
The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
129
161
130
162
## T {#t}
131
163
132
164
[]()
133
165
134
166
## U {#u}
135
167
136
-
[]()
168
+
[Underfitting](#underfitting)
169
+
Underfitting is when a data model is unable to capture the relationship between the input and output variables accurately, generating a high error rate on both the training set and unseen data
Input validation is a technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the code, or when communicating with other components
104
+
99
105
[Intrusion Detection Systems (IDS)](#ids)
100
-
Security service that monitors and analyzes network or system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.
106
+
Security service that monitors and analyzes network or system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner
101
107
102
108
[Intrusion Prevention System (IPS)](#ips)
103
-
System that can detect an intrusive activity and can also attempt to stop the activity, ideally before it reaches its targets.
109
+
System that can detect an intrusive activity and can also attempt to stop the activity, ideally before it reaches its targets
104
110
105
111
## J {#j}
106
112
@@ -139,7 +145,8 @@ Overfitting is when a statistical model begins to describe the random error in t
0 commit comments