In this chapter, we continued our journey of learning how to bypass machine learning models. In the previous chapter, we discovered adversarial machine learning; in this continuation, we explored adversarial deep learning and how to fool deep learning networks. We looked at some real-world cases to learn how to escape anti-malware systems by using state of the art techniques. In the next and last chapter, we are going to gain more knowledge, learning how to build robust models.





















































