# data-security
3 articlestagged with “data-security”
Data & Training Security
Security vulnerabilities in the AI data pipeline, covering RAG exploitation, training data attacks, model extraction and intellectual property theft, and privacy attacks against deployed models.
data-securityragtraining-attacksmodel-extractionprivacydata-poisoning
Securing Storage Systems for Training Data
Attack and defense strategies for S3, GCS, HDFS, and object storage systems holding AI training datasets and model artifacts
infrastructurestorage-securitys3gcshdfsdata-securitytraining-data
Security Implications of Training Data Deduplication
Analysis of how deduplication algorithms create security vulnerabilities, including adversarial deduplication evasion, strategic duplicate injection, and hash collision attacks.
training-pipelinededuplicationdata-securitypreprocessing