acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account