Platform guide
...
AISpectra
Automated RedTeaming for AI/ML
Analyze your models
1min
you can analyze your model for vulnerabilities by using the model analysis api to test your model, refer to the table below to see the different attack types you can try use these attacks to generate vulnerability reports, sample attack vectors, and a threat informed defense model based on input parameters, data, and model files you can use the suggested input parameter configuration or experiment with specific parameters to see how vulnerability reports and threat informed defense models are generated you have to first register your model using \<post> model registration docid\ qknp3vmrqawjezaeochlh api to get started with model analysis after that there are other apis which you can use to get \<get> job metadata docid\ s mz7r0hnzicdqy6q 6hq and \<get> retrieve artifacts docid\ wpap09t55lt3z8rwy uz9 and more supported data input task type inputs parameters model analysis apis usecase reference implementation images image classification image classification docid 6deiimjnkl5d0cdwstckb image classification docid 7pftv3d26cujsz6vmqloo recognizing handwritten digits for digit recognition in postal services reference image segmentation image segmentation docid\ bixnemi0euujfumau7ebx image segmentation docid\ zgifjwp4yrvb4uog5 qvh in medical imaging, segmenting tumor regions from brain mri scans to assist in diagnosing and treating brain tumors tabular tabular classification tabular classification docid\ mvtlctnkashpx9mzjvb62 tabular classification docid\ v08lzx7yc3id62w3z63yg predicting customer churn in a telecommunications company based on historical usage data reference time series forecasting time series forecasting docid\ kdsa2hzsaxo0wcqicddc4 times series forecasting docid\ eb7fsmb2o fz1 rlafm9u predicting stock prices using time series forecasting reference text text classification text recommendation docid\ rp8 2r2fwgpobf37lmgab text recommendation (alpha release) docid\ pf0 v4ug62 akwbxclkoz categorizing emails as "spam" or "not spam" based on their content static assessment supply chain supply chain attacks docid\ j4ucaho6hljpp6kfpvuvw supply chain analysis docid\ xj37o9kmfmrai84bslqwx scan for serialisation threats, backdoor attacks and any pii, keys leak in notebook files