Training Data Integrity
Defense-focused guide to ensuring training data has not been poisoned, covering label flipping, backdoor insertion, clean-label attacks, data validation pipelines, provenance tracking, and anomaly detection.
supply-chaindata-poisoningowasp-llm04validationprovenanceanomaly-detectiondefense