Skip to main content
redteams.ai
All tags

# compute-hijacking

1 articletagged with “compute-hijacking

ML Pipeline Poisoning

Attack techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.

pipeline-poisoningtraining-manipulationdata-injectioncompute-hijackingartifact-substitutionml-cicd
Advanced