or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
About me
https://rewanthtammana.com/
Rewanth Tammana is a security ninja, open-source contributor, independent consultant & SME at Uptycs. Previously, Senior Security Architect at Emirates NBD. Passionate about DevSecOps, Application, and Container Security. Added 17,000+ lines of code to Nmap. Holds industry certifications like CKS, CKA, etc.
About me
https://twitter.com/rewanthtammana
Speaker & trainer at international security conferences worldwide including Black Hat, Defcon, Hack In The Box (Dubai and Amsterdam), CRESTCon UK, PHDays, Nullcon, Bsides, CISO Platform, null chapters and multiple others.
About me
https://linkedin.com/in/rewanthtammana
One of the MVP researchers on Bugcrowd (2018) and identified vulnerabilities in several organizations. Published an IEEE research paper on an offensive attack in Machine Learning and Security. Also, part of the renowned Google Summer of Code program.
Importance of Data Security in AI
Why
Reference - codeandhack.com
Why
Reference - theverge.com
Why
Reference - axios.com
Why
Reference - reuters
Why
Reference - washingtonpost.com
Why
Reference - tenable.com
How to prevent
How to prevent
What is Local AI Model Execution?
Benefits
Introducing Hugging Face
Hugging face models count
Stable Diffusion research paper
Hugging face filter options
Pre-compiled models
Hands-on: Setting up Hugging Face
Hands-on: Text Generation
Demo - Create a short story using a pre-trained model
Hands-on: Text Generation
Hands-on: Text Generation
Hands-on: Creating Pictures from Text
The power of advanced models in Hugging Face.
Demo - Generating an image from a text description.
Hands-on: Creating Pictures from Text
Hands-on: Creating Pictures from Text
Creating Pictures from Text
Stable Diffusion Web UI
https://github.com/AUTOMATIC1111/stable-diffusion-webui
Spin up Web UI
Spin up Web UI
Creating Picture from Text
Reverse engineer a picture
Look at picture from your ML model POV
Change a feature of ML interpretation
Change a feature of ML interpretation
Hands-on: Code Writing with AI
Demo - Writing a simple Python function with the help of Hugging Face.
Hands-on: Code Writing with AI
Hands-on: Code Writing with AI
Train for your scope of work
Datasets
Datasets
Hugging Face
Datasets
Kaggle
Datasets
Datasets
BE CAREFUL!!
Zip file security attacks
Case Study 1
Reference - helpnetsecurity.com
Reference - helpnetsecurity.com
Case Study 2
Reference - kroll.com
Case Study 2
Reference - kroll.com
Case Study 2
Reference - kroll.com
Case Study 3
Reference - unit42
Case Study 3
Reference - unit42
BE CAREFUL!!
Advantages of Local AI Execution
The Future of Safe AI
Recap
Thank You!
Write to me on:
Google: Rewanth Tammana
Website: rewanthtammana.com
Twitter: @rewanthtammana
LinkedIn: /in/rewanthtammana