Skip to main content
redteams.ai
All tags

# training-manipulation

2 articlestagged with “training-manipulation

ML Pipeline Poisoning

Attack techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.

pipeline-poisoningtraining-manipulationdata-injectioncompute-hijackingartifact-substitutionml-cicd
Advanced

Manipulating Curriculum Learning Schedules

How adversaries exploit curriculum learning by manipulating data ordering, difficulty scheduling, and stage transitions to embed vulnerabilities during training.

training-pipelinecurriculum-learningdata-orderingtraining-manipulation
Advanced