diff --git a/assignments/tex/assignment_4.pdf b/assignments/tex/assignment_4.pdf index 29a00db..dc70115 100644 Binary files a/assignments/tex/assignment_4.pdf and b/assignments/tex/assignment_4.pdf differ diff --git a/assignments/tex/assignment_4.tex b/assignments/tex/assignment_4.tex index 79adad5..764672b 100644 --- a/assignments/tex/assignment_4.tex +++ b/assignments/tex/assignment_4.tex @@ -54,7 +54,7 @@ \section{Submit Code Results.} \noindent In the real world, after performing this red-teaming exercise, you would want to contact your manager and your organization's IT security team to discuss any discovered vulnerabilities. Countermeasures to discuss with business and IT colleagues may relate to authentication on the vulnerable model API endpoint, throttling/rate-limiting of the vulnerable model API and monitoring the model's production scoring queue for random data and training data, if possible.\\ -\noindent \textbf{Your deliverables are due Saturday, June 21\textsuperscript{st}, at 11:59 PM ET.}\\ +\noindent \textbf{Your deliverables are due Wednesday, June 21\textsuperscript{st}, at 11:59 PM ET.}\\ \noindent Note that you may also improve Assignment 1 or 3 scores throughout the Summer I Session to improve your ranking, your Assignment 1 grade, your Assignment 3 grade, and your final project grade. Moving forward, you'll need to be able to show that your new predictions preserve AIR $>$ 0.8 for all protected groups.