{"id":593,"date":"2022-04-07T11:50:43","date_gmt":"2022-04-07T10:50:43","guid":{"rendered":"https:\/\/forhumanity.center\/definitions\/?post_type=glossary&#038;p=593"},"modified":"2022-04-07T11:50:44","modified_gmt":"2022-04-07T10:50:44","slug":"data-entry-point-attacks","status":"publish","type":"glossary","link":"https:\/\/forhumanity.center\/definitions\/glossario\/data-entry-point-attacks\/","title":{"rendered":"Data Entry Point Attacks"},"content":{"rendered":"<p>vulnerabilities and attacks associated with the data used for training and <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/processing\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">processing<\/a> data, where the adversary manipulates the data in order to attack, alter or otherwise corrupt the intended purpose, scope and nature of the algorithmic system (e.g., <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/data-poisoning\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">data poisoning<\/a>, <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/model-inversion\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">model inversion<\/a>, model evasion)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>vulnerabilities and attacks associated with the data used for training and <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/processing\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">processing<\/a> data, where the adversary manipulates the data in order to attack, alter or otherwise corrupt the intended purpose, scope and nature of the algorithmic system (e.g., <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/data-poisoning\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">data poisoning<\/a>, <a class=\"glossaryLink\" href=\"https:\/\/forhumanity.center\/definitions\/glossario\/model-inversion\/\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\" tabindex=\"0\" role=\"link\">model inversion<\/a>, model evasion)<\/p>\n","protected":false},"author":2,"featured_media":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-593","glossary","type-glossary","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Entry Point Attacks - Definitions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Entry Point Attacks - Definitions\" \/>\n<meta property=\"og:description\" content=\"vulnerabilities and attacks associated with the data used for training and processing data, where the adversary manipulates the data in order to attack, alter or otherwise corrupt the intended purpose, scope and nature of the algorithmic system (e.g., data poisoning, model inversion, model evasion)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Definitions\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-07T10:50:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/\",\"url\":\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/\",\"name\":\"Data Entry Point Attacks - Definitions\",\"isPartOf\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/#website\"},\"datePublished\":\"2022-04-07T10:50:43+00:00\",\"dateModified\":\"2022-04-07T10:50:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/forhumanity.center\/definitions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Entry Point Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/#website\",\"url\":\"https:\/\/forhumanity.center\/definitions\/\",\"name\":\"Definitions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/forhumanity.center\/definitions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/#organization\",\"name\":\"Definitions\",\"url\":\"https:\/\/forhumanity.center\/definitions\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg\",\"contentUrl\":\"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg\",\"width\":744,\"height\":102,\"caption\":\"Definitions\"},\"image\":{\"@id\":\"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Entry Point Attacks - Definitions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/","og_locale":"en_GB","og_type":"article","og_title":"Data Entry Point Attacks - Definitions","og_description":"vulnerabilities and attacks associated with the data used for training and processing data, where the adversary manipulates the data in order to attack, alter or otherwise corrupt the intended purpose, scope and nature of the algorithmic system (e.g., data poisoning, model inversion, model evasion)","og_url":"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/","og_site_name":"Definitions","article_modified_time":"2022-04-07T10:50:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/","url":"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/","name":"Data Entry Point Attacks - Definitions","isPartOf":{"@id":"https:\/\/forhumanity.center\/definitions\/#website"},"datePublished":"2022-04-07T10:50:43+00:00","dateModified":"2022-04-07T10:50:44+00:00","breadcrumb":{"@id":"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/forhumanity.center\/definitions\/glossary\/data-entry-point-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/forhumanity.center\/definitions\/"},{"@type":"ListItem","position":2,"name":"Data Entry Point Attacks"}]},{"@type":"WebSite","@id":"https:\/\/forhumanity.center\/definitions\/#website","url":"https:\/\/forhumanity.center\/definitions\/","name":"Definitions","description":"","publisher":{"@id":"https:\/\/forhumanity.center\/definitions\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/forhumanity.center\/definitions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/forhumanity.center\/definitions\/#organization","name":"Definitions","url":"https:\/\/forhumanity.center\/definitions\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/","url":"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg","contentUrl":"https:\/\/forhumanity.center\/definitions\/wp-content\/uploads\/2024\/11\/Asset-7.svg","width":744,"height":102,"caption":"Definitions"},"image":{"@id":"https:\/\/forhumanity.center\/definitions\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":1,"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary\/593\/revisions"}],"predecessor-version":[{"id":618,"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/glossary\/593\/revisions\/618"}],"wp:attachment":[{"href":"https:\/\/forhumanity.center\/definitions\/wp-json\/wp\/v2\/media?parent=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}