# ml-cicd
2 articlestagged with “ml-cicd”
ML CI/CD Security
Security overview of ML continuous integration and deployment pipelines: how ML CI/CD differs from traditional CI/CD, unique attack surfaces in training workflows, and the security implications of automated model building and deployment.
ml-cicdpipeline-securitytraining-pipelinedeploymentautomationdevops
ML Pipeline Poisoning
Attack techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.
pipeline-poisoningtraining-manipulationdata-injectioncompute-hijackingartifact-substitutionml-cicd