model extraction,stealing,query
Model extraction steals model via queries. Build substitute model. Protect with rate limiting.
9,967 technical terms and definitions
Model extraction steals model via queries. Build substitute model. Protect with rate limiting.
Model fingerprints identify models from behavior. Unique responses to probe inputs.
Effective compute utilization.
Hugging Face Hub hosts open models and datasets. Download weights, run locally, fine-tune, share.
Reconstruct training data from model parameters or outputs.
Reconstruct training data from model.
Prevent reconstruction of training data.
Model inversion attacks reconstruct training data from model parameters or outputs.
Combine weights from multiple fine-tuned models to get benefits of both.
Track model performance metrics and detect degradation.
Techniques to split models across GPUs (tensor pipeline expert).
Split model layers across devices each device has subset of parameters.
Use predictive models for process control.
Model predictive control optimizes future actions using process models and constraints.
Optimize actions using predictive model.
Central repository for storing and versioning trained models.
Model registry versions and stages models. MLflow, W&B, SageMaker.
Periodically retrain model on fresh data to maintain performance.
Model routing directs requests to appropriate models based on query characteristics.
Model servers (vLLM, TGI, Triton) host models for inference. Handle batching, scaling, API.
Infrastructure for deploying models (Seldon KServe BentoML).
Infrastructure to deploy models and handle inference requests.
Disk space required to store model weights.
Average fine-tuned models.
Replicate model by querying.
Connect different model parts.
Connect different model parts.
Model extraction attacks steal model via API queries. Protect with rate limits, output perturbation, watermarks.
Verify model hasn't been tampered with.
Track different versions of trained models.
Embed secret signals in model to prove ownership or detect unauthorized use.
MAML applied to RL.
Fit geometric model to optical data.
Learn environment model to improve sample efficiency.
OpenAI's content moderation.
Continuous-valued Hopfield networks equivalent to attention.
Adapt traditional charts.
Networks built from reusable modules.
Networks composed of specialized modules.
Optimize community structure quality.
All-to-all communication overhead.
Mixture-of-Experts (MoE) models route each token through a few experts instead of all layers. This yields very large capacity at lower compute per token.
EMC absorbing water.
Protect from moisture.
Protect from humidity.
Moisture levels in cleanrooms and tool environments affect process quality.
Moisture resistance testing exposes packages to humidity assessing corrosion and seal integrity.
Classification of moisture sensitivity.
Moisture sensitivity levels classify packages by susceptibility to moisture-induced damage during soldering.
Failures from moisture ingress.