Platform guide
...
Artifacts
Vulnerability Report
1 min
the vulnerability report provides information about critical vulnerabilities related to model attacks it includes an overview of the severity of the issue and associated risks, and suggests mitigation measures following are the different parts explaining the model metrics in detail part 1 overview this section of the report presents metadata information for the job id, including details such as the attack type, number of attack queries, stolen model accuracy, alert level (low or high), and whether defense measures are recommended or not part 2 security in this section of the report, we emphasize the relative metrics score achieved by the extracted model part 3 performance in this section of the report, we examine the critical aspects of inference time and respective metrics for both the original model and the extracted model we discuss the time required for the models to generate predictions on new data, as well as the performance metrics used to measure their accuracy and overall effectiveness part 4 drift this section highlights the application of statistical tests for detecting data drift data drift refers to changes in the statistical properties of the input data used to train a model we will introduce this upcoming feature to our product part 5 appendix the appendix section of the report serves as a comprehensive resource, offering essential information regarding the architectures of both the original model and model attack type to see sample vulnerability report for respective attack types, refer the below table input type vulnerbility report image classification https //aisdocs blob core windows net/reference/reports/image/imageclassification/mea/vulnerabilityreport pdf https //aisdocs blob core windows net/reference/reports/image/imageclassification/evasion/vulnerabilityreport pdf , https //aisdocs blob core windows net/reference/reports/image/imageclassification/poisoning/vulnerabilityreport pdf , https //aisdocs blob core windows net/reference/reports/image/imageclassification/poisoning/vulnerabilityreport datapoisoning pdf image segmentation https //aisdocs blob core windows net/reference/reports/image/imagesegmentation/mea/vulnerabilityreport pdf object detection https //aisdocs blob core windows net/reference/reports/image/objectdetection/evasion/vulnerabilityreport pdf tabular classification https //aisdocs blob core windows net/reference/reports/tabular/tabularclassification/mea/vulnerabilityreport pdf , https //aisdocs blob core windows net/reference/reports/tabular/tabularclassification/evasion/vulnerabilityreport pdf time series forecasting https //aisdocs blob core windows net/reference/reports/timeseries/forecasting/mea/ml/vulnerabilityreport pdf , https //aisdocs blob core windows net/reference/reports/timeseries/forecasting/mea/dl/vulnerabilityreport pdf text classification https //aisdocs blob core windows net/reference/reports/text/textclassification/mea/vulnerabilityreport pdf text recommendation https //aisdocs blob core windows net/reference/reports/text/textrecommendation/mea/vulnerabilityreport pdf audiospeechrecognition https //aisdocs blob core windows net/reference/reports/audio/audiospeechrecognition/evasion/vulnerabilityreport pdf supply chain https //aisdocs blob core windows net/reference/reports/supply chain/vulnerabilityreport pdf
