Introduction: Hacking facial recognition
Chapter 1: A brief overview of artificial intelligence
Chapter 2: How AI is different from traditional software
Chapter 3: Data bias
Chapter 4: Hacking AI systems
Chapter 5: Evasion Attacks
Chapter 6: Data Poisoning
Chapter 7: Model Inversion (“Privacy”) Attacks
Chapter 8: Obfuscation attacks
Chapter 9: Talking to AI: Model interpretability
Chapter 10: Machine vs. machine
Chapter 11: Will someone hack my AI?
About the Author