Purdue researchers create ‘self-aware’ algorithm to ward off hacking attempts
Even if an attacker is armed with a perfect duplicate of a system’s model, any attempt to introduce falsified data will be immediately detected and rejected by the system itself.