# training-manipulation
2 articlestagged with “training-manipulation”
ML Pipeline Poisoning
Attack techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.
pipeline-poisoningtraining-manipulationdata-injectioncompute-hijackingartifact-substitutionml-cicd
Manipulating Curriculum Learning Schedules
How adversaries exploit curriculum learning by manipulating data ordering, difficulty scheduling, and stage transitions to embed vulnerabilities during training.
training-pipelinecurriculum-learningdata-orderingtraining-manipulation