
Slajdy z pierwszych wprowadzających zajęć
| Data | Slot | Temat | Prelegent | Materiały |
|---|---|---|---|---|
| Seria 1 | ||||
| 15.10 | 1 i 2 | Introduction into AI Security | Szymon L. | ... |
| 22.10 | 1 | OWASP Top 10 for LLMs | Mateusz K-s. | ... |
| 2 | Halucinations | Julia K. | ... | |
| 29.10 | 1 | AI in creating malware | Miriam B. | ... |
| 2 | Model inversion attaks | Mateusz K-t. | ... | |
| 3 | Data sets review | Kacper G. | ... | |
| 05.11 | 1 | AI in misinformation | Michał W. | ... |
| 2 | Agentic AI security | Wiktor O. | ... | |
| 12.11 | 1 | AI in deep fakes | Kornel O. | ... |
| 2 | Data poisoning | Oskar K. | ... | |
| 19.11 | - | - | - | ... |
| 03.12 | 1 | AI in phishing e-mails | Paweł N. | ... |
| 2 | Adversarial attacks | Krzysztof J. | ... | |
| 3 | Building playground and show a case for LLM | Krzysztof Ch. | ... | |
| 10.12 | 1 | Prompt injections | Adrian W. | ... |
| 2 | AI in socialengeneering | Katarzyna T. | ... | |
| Seria 2 | ||||
| 17.12 | 1 | LLMs & VLLMs Safety Pipelines | Julia K. | ... |
| 2 | AI in data classification | Oskar K. | ... | |
| 07.01 | 1 | AI in phishing detection | Kornel O. | ... |
| 2 | AI in penetration testing overview | Mateusz K-s | ... | |
| 3 | AI in secure code generation | Mateusz K-t | ... | |
| 14.01 | 1 | AI in Watermarking | Michał W. | ... |
| 2 | AI in incident detection & response | Adrian W. | ... | |
| 3 | Privacy challenges | Katarzyna T. | ... | |
| 21.01 | 1 | AI in software vulnerabilities detection & repair | Miriam B. | ... |
| 2 | AI in code obsfuscation and deobfuscation | Krzysztof Ch. | ... | |
| 28.01 | 1 | AI in malware detection | Wiktor O. | ... |
| 2 | AI in cyber threat analysis | Kacper G. | ... | |
| 04.02 | 1 | ... | ||
| 2 | ... | |||