Book Content
chapters • 11h total length
1. On Cybersecurity and Machine Learning
2. Detecting Suspicious Activity
3. Malware Detection Using Transformers and BERT
4. Detecting Fake Reviews
5. Detecting Deepfakes
6. Detecting Machine-Generated Text
7. Attributing Authorship and How to Evade it
8. Detecting Fake News with Graph Neural Networks
9. Attacking Models with Adversarial Machine Learning
10. Protecting User Privacy with Differential Privacy
11. Protecting User Privacy with Federated Machine Learning
12. Breaking into the Sec-ML Industry














