# data-ordering
2 articlestagged with “data-ordering”
Manipulating Curriculum Learning Schedules
How adversaries exploit curriculum learning by manipulating data ordering, difficulty scheduling, and stage transitions to embed vulnerabilities during training.
training-pipelinecurriculum-learningdata-orderingtraining-manipulation
Manipulating Curriculum Learning Schedules
How adversaries exploit curriculum learning by manipulating data ordering, difficulty scheduling, and stage transitions to embed vulnerabilities during training.
training-pipelinecurriculum-learningdata-orderingtraining-manipulation