# integrity
6 articlestagged with “integrity”
Model Tampering Detection
Detecting model file tampering: weight hash verification, architecture validation, adapter inspection, quantization verification, and supply chain integrity checks.
Model Tampering Detection (Ai Forensics Ir)
Detecting unauthorized modifications to model weights, configurations, and serving infrastructure through integrity verification and behavioral analysis.
Data Provenance Attacks
Compromising training data integrity by attacking provenance tracking systems, falsifying data lineage, and manipulating data pipeline metadata.
Data Provenance and Lineage
Tracking data through ML pipelines, detecting contamination, verifying data integrity, and implementing provenance systems for training data security.
Model Artifact Integrity Verification
Implementing integrity verification for model artifacts through checksums, signatures, and provenance tracking.
Model Artifact Security
Securing model artifacts throughout the lifecycle including signing, verification, storage encryption, and tamper detection.