{"id":898,"date":"2025-03-12T08:18:33","date_gmt":"2025-03-12T08:18:33","guid":{"rendered":"https:\/\/www.kios.ucy.ac.cy\/guardai\/?page_id=898"},"modified":"2025-07-10T13:20:22","modified_gmt":"2025-07-10T13:20:22","slug":"best-practices","status":"publish","type":"page","link":"https:\/\/www.kios.ucy.ac.cy\/guardai\/k4ai\/knowledge-base\/best-practices\/","title":{"rendered":"Best Practices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"898\" class=\"elementor elementor-898\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5af4408 e-flex e-con-boxed e-con e-parent\" data-id=\"5af4408\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eaea9fd elementor-widget elementor-widget-spacer\" data-id=\"eaea9fd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e92ff3 e-flex e-con-boxed e-con e-parent\" data-id=\"2e92ff3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34fddfe elementor-widget elementor-widget-text-editor\" data-id=\"34fddfe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1236\" data-end=\"1460\">Discover best practices, industry insights, and sector-specific approaches to AI safety and security. These guidelines support practitioners in adapting AI security measures to the needs of different application domains.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71484ad e-flex e-con-boxed e-con e-parent\" data-id=\"71484ad\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-667a926 elementor-widget elementor-widget-spacer\" data-id=\"667a926\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c78660c e-flex e-con-boxed e-con e-parent\" data-id=\"c78660c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-074e498 e-con-full e-flex e-con e-child\" data-id=\"074e498\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04ca5f0 elementor-widget elementor-widget-video\" data-id=\"04ca5f0\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=OQxvMz5ACyk&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc484a2 elementor-widget elementor-widget-text-editor\" data-id=\"bc484a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Adversarial AI &amp; Machine Learning | Webinar<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c3a78b e-con-full e-flex e-con e-child\" data-id=\"9c3a78b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19c0073 elementor-widget elementor-widget-video\" data-id=\"19c0073\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=wIX00bZ173k&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05205a5 elementor-widget elementor-widget-text-editor\" data-id=\"05205a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Adversarial Robustness<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef9792e e-con-full e-flex e-con e-child\" data-id=\"ef9792e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b49977 elementor-widget elementor-widget-video\" data-id=\"6b49977\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=DuA-MC6Nbug&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-712d7be elementor-widget elementor-widget-text-editor\" data-id=\"712d7be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Towards Guaranteed Safe AI: A Framework to Ensure Robust and Reliable AI Systems<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc38917 e-con-full e-flex e-con e-child\" data-id=\"cc38917\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50bbd3e elementor-widget elementor-widget-video\" data-id=\"50bbd3e\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=_y1tIdnB__Y&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4bd7eb elementor-widget elementor-widget-text-editor\" data-id=\"e4bd7eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>One pixel attack | Just change one pixel and<\/strong><strong>&nbsp;fool the neural network into making crazy predictions<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-00b5304 e-con-full e-flex e-con e-child\" data-id=\"00b5304\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da86b5a elementor-widget elementor-widget-video\" data-id=\"da86b5a\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=tRxQKz2LEmQ&amp;list=PLdS-x_Oa32JdkC-aTjw1Argxp2jzMdJFi&amp;index=36&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63fa704 elementor-widget elementor-widget-text-editor\" data-id=\"63fa704\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Adversarial Robustness and Certification\u00a0<\/strong><strong>by Prof. Ghanem and Motasem Alfarra<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f62d5e7 e-con-full e-flex e-con e-child\" data-id=\"f62d5e7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ed15c2 elementor-widget elementor-widget-video\" data-id=\"6ed15c2\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=KDp8SHgLUig&amp;list=PLdS-x_Oa32JdkC-aTjw1Argxp2jzMdJFi&amp;index=38&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0da8c6d elementor-widget elementor-widget-text-editor\" data-id=\"0da8c6d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Deep Neural Network Robustness course: Realistic perturbations by Juan Camillo Perez Santamaria<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover best practices, industry insights, and sector-specific approaches to AI safety and security. These guidelines support practitioners in adapting AI security measures to the needs of different application domains. https:\/\/www.youtube.com\/watch?v=OQxvMz5ACyk Adversarial AI &amp; Machine Learning | Webinar https:\/\/www.youtube.com\/watch?v=wIX00bZ173k Adversarial Robustness https:\/\/www.youtube.com\/watch?v=DuA-MC6Nbug Towards Guaranteed Safe AI: A Framework to Ensure Robust and Reliable AI Systems https:\/\/www.youtube.com\/watch?v=_y1tIdnB__Y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":867,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-898","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/comments?post=898"}],"version-history":[{"count":22,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/898\/revisions"}],"predecessor-version":[{"id":1309,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/898\/revisions\/1309"}],"up":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/pages\/867"}],"wp:attachment":[{"href":"https:\/\/www.kios.ucy.ac.cy\/guardai\/wp-json\/wp\/v2\/media?parent=898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}