# checkpoints
2 articlestagged with “checkpoints”
Security of Training Checkpoints
Threat analysis of model checkpoint storage, serialization, and restoration including checkpoint poisoning, deserialization attacks, and integrity verification.
training-pipelinecheckpointsmodel-securitysupply-chain
安全 of 訓練 Checkpoints
Threat analysis of model checkpoint storage, serialization, and restoration including checkpoint poisoning, deserialization attacks, and integrity verification.
training-pipelinecheckpointsmodel-securitysupply-chain