![[Featured Image] A group of employees meet to discuss how to protect their organization using adversarial machine learning.](https://images.ctfassets.net/wp1lcwdav1p1/7x78wjRL9EGGhCELAUqkgW/a7d44ab72735cb5f543e8c3341b1279e/GettyImages-1501883558.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
What Is Adversarial Machine Learning?
Adversarial machine learning focuses on the vulnerability of manipulation of a machine learning model by deceiving inputs designed to cause the application to work improperly. Learn more about what adversarial machine learning is and why it’s important.
March 27, 2024
Article

![[Featured Image] A statistician goes over some autoregressive models on a laptop while sitting at a desk.](https://images.ctfassets.net/wp1lcwdav1p1/6j5LmRW458IuuW52TWRMTA/da059c0e2c3dd5d9bda30765bc417c34/GettyImages-1714543180.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A woman uses her smartphone to shop online for furniture and see how it would look in her house, one of many augmented reality examples.](https://images.ctfassets.net/wp1lcwdav1p1/2bzxvC8K1Cv0OMSQEA7p9l/eaa3de48c71d61a4a7d9c064d7235db6/GettyImages-1351925376.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured Image] Two colleagues stand in an office and look at a tablet as they discuss the differences between ChatGPT 3 vs 4.](https://images.ctfassets.net/wp1lcwdav1p1/1WYYY3JwhTOhXZLbGq7Oz6/b0570e4b14011ed28615ba60fb9042b6/GettyImages-1835659373.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Two AI professionals in an office setting looking at computer screens discuss artificial general intelligence vs. AI.](https://images.ctfassets.net/wp1lcwdav1p1/39rJgA408Vtg75CvWoH34V/b306e1c8c64ff28b2db6d205b610c812/GettyImages-867421026.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] Two colleagues sit at a table discussing the advantages of Bayesian neural networks.](https://images.ctfassets.net/wp1lcwdav1p1/2MDahE77dDTZRtOXOWV8tv/ef4f4863bf1c86977b237e102ef5168a/GettyImages-920638152.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A marketer uses cluster analysis in R to identify specific groups of customers.](https://images.ctfassets.net/wp1lcwdav1p1/J806XL5RSGg4I59pHHFeg/24c484ab50b649d677896d08ea5b5480/GettyImages-1463675887.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A doctor sits at a desk in front of a computer and uses deep learning applications to diagnose diseases.](https://images.ctfassets.net/wp1lcwdav1p1/4BrXgzjSbRynOQD7jXfi38/139d9697cf005a54e3848bbcc00e8e09/GettyImages-450771159.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A person in a cybersecurity boot camp learns about deep learning algorithms.](https://images.ctfassets.net/wp1lcwdav1p1/1b53pKLIMHdxS4CUh7GWoO/3ff3a350de5367d097d5b6a8b0eda518/GettyImages-1252668203.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A group of tech employees gather in a conference room for a friendly debate over whether to use traditional AI vs. generative AI for their project.](https://images.ctfassets.net/wp1lcwdav1p1/rPlvdAdbABultIPo5oJcY/ddb4dda1d2bdf61c18ea888032e651d4/GettyImages-982403996.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Three engineers discuss simultaneous localization and mapping while looking at a drone.](https://images.ctfassets.net/wp1lcwdav1p1/35RJWaEASQUYzbuZ8C0Rzq/8583e37f7d738b7cbcd516ce1ef5593b/GettyImages-1420561207.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A computational scientist conducts research on a computer in a lab.](https://images.ctfassets.net/wp1lcwdav1p1/7jf21ABYYjujZVcxbIhDlT/d96e6f6ecaf9a88abc4648f41382b0b4/GettyImages-1264101225.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
