# pipeline-poisoning
標記為「pipeline-poisoning」的 8 篇文章
Sequential Workflow Exploitation
Techniques for exploiting sequential agentic workflows by poisoning early stages to corrupt downstream processing, manipulating checkpoints, and exploiting inter-step data dependencies.
Azure ML Exploitation
Red team attack methodology for Azure Machine Learning: workspace security, compute instance attacks, pipeline poisoning, model registry tampering, and data store exploitation.
Continuous Learning Pipeline Poisoning
Exploit continuous/online learning pipelines by injecting adversarial examples that gradually shift model behavior.
ML Pipeline Poisoning
Attack techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.
順序工作流程攻擊
利用順序代理工作流程之技術:投毒早期階段以污染下游處理、操弄檢查點,以及利用步驟間資料依賴。
Azure ML 利用ation
Red team attack methodology for Azure Machine Learning: workspace security, compute instance attacks, pipeline poisoning, model registry tampering, and data store exploitation.
Continuous Learning Pipeline 投毒
利用 continuous/online learning pipelines by injecting adversarial examples that gradually shift model behavior.
ML Pipeline 投毒
攻擊 techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.