trusted computing methods of safeguarding models used to create artificial intelligence and machine learning systems to ensure that models compromised by cyber attacks do not inadvertently reveal sensitive information
Sourced through Scoop.it from: www.militaryaerospace.com