{"id":1908,"date":"2025-01-28T16:30:25","date_gmt":"2025-01-28T15:30:25","guid":{"rendered":"https:\/\/lab.the-bunker.it\/2025\/01\/28\/adversarial-examples-hidden-threats-to-neural-networks\/"},"modified":"2025-11-11T23:43:17","modified_gmt":"2025-11-11T22:43:17","slug":"adversarial-examples-hidden-threats-to-neural-networks","status":"publish","type":"post","link":"https:\/\/lab.the-bunker.it\/en\/2025\/01\/28\/adversarial-examples-hidden-threats-to-neural-networks\/","title":{"rendered":"Adversarial Examples: Hidden threats to neural networks"},"content":{"rendered":"<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.the-bunker.it\" title=\"Facebook\"><\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%26amp%3Burl%3Dhttps%253A%252F%252Fwww.the-bunker.it\" title=\"Twitter\"><\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/t.me\/share\/url?url=https%3A%2F%2Fwww.the-bunker.it&#038;text=\" title=\"Telegram\"><\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/wa.me\/?text=https%3A%2F%2Fwww.the-bunker.it\" title=\"WhatsApp\"><\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.threads.net\/intent\/post?text=https%3A%2F%2Fwww.the-bunker.it\" title=\"Threads\"><\/a><\/li>\n<\/ul>\n<p>Although the functioning of machine learning algorithms may seem abstract and difficult to decipher, they rely on a series of structured processes that make them vulnerable to specific threats. Understanding the risks these tools are exposed to is essential for developing greater awareness in their use.<\/p>\n<p>The following is an interview with\u00a0Pau Labarta Bajo, a Mathematician who transitioned to a Machine Learning Engineer and later became an educator in the field of Machine Learning.\u00a0Driven by his passion for problem-solving, Pau participated in the International Mathematical Olympiad, which reflects his lifelong enthusiasm for tackling complex challenges \u0097 a key aspect of machine learning.\u00a0He began his career over a decade ago as a Quantitative Analyst at Erste Bank and subsequently worked as a Data Scientist at Nordeus, a mobile gaming company that is now part of Take-Two Interactive. It was at Nordeus that he encountered his first real-world machine learning project, a pivotal experience that cemented his interest in the field.<\/p>\n<p>Since then, Pau has freelanced at Toptal, contributing to diverse projects ranging from self-driving cars and financial services to delivery apps, time-series predictions for online retail, and solutions for health insurance providers.\u00a0Two years ago, Pau started sharing his knowledge with the community on platforms like Twitter\/X and LinkedIn. His first course, <i style=\"text-align: var(--text-align); background-color: rgba(164, 25, 255, 0); letter-spacing: 0px;\">The Real-World Machine Learning Tutorial<\/i>, has garnered over 500 satisfied students, and he continues to share valuable free content through his social media channels.<\/p>\n<figure>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_2.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"FABIO GNASSI_PAU LABARTA_MACHINE LEARNING_THE BUNKER MAGAZINE_00\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTQzNjIsInVybCI6Imh0dHBzOlwvXC93d3cudGhlLWJ1bmtlci5pdFwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL3N0b3BfMi5qcGcifQ%3D%3D\"><br \/>\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"763\" height=\"576\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_2.jpg\" alt=\"\" srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_2.jpg 763w, https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_2.jpg 600w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/>\t\t\t\t\t\t\t\t<\/a><figcaption><\/figcaption><\/figure>\n<h5><b>One of the risks faced by machine learning systems is known as &#8220;Adversarial Machine Learning.&#8221; Could you explain what this involves?<\/b><\/h5>\n<p>The term AML (Adversarial Machine Learning) refers to a set of techniques and procedures designed to compromise the functioning of a machine learning model. Machine learning models can be applied in various fields, such as developing applications for computer vision or generating text and images. Each of these categories of models can be attacked using processes known as &#8220;Adversarial Techniques,&#8221; which alter the behaviour of a model by introducing manipulated data, referred to as &#8220;Adversarial Examples.&#8221;<\/p>\n<p>The way a model is compromised depends on how these tools operate. Neural networks are &#8220;differentiable with respect to the input,&#8221; meaning even minimal variations in input data can significantly affect the quality of the generated outputs. Inputs are the raw data provided to the model, while outputs are the expected results. The model analyses and processes inputs to identify patterns, which are then associated with a specific output. A model can be attacked at two distinct stages: during the training phase or during the inference phase.<\/p>\n<p>Interestingly, humans can also be deceived in similar ways. For instance, comparing the human brain to a computer vision system, both can fall victim to optical illusions, as seen when observing Escher\u0092s paradoxical drawings.<\/p>\n<h5><b>How do these attacks work?<\/b><\/h5>\n<p>Firstly, it is important to distinguish between attacks occurring in the digital world and those in the physical world. Digital attacks target both the training and inference phases. The inference phase occurs when a pre-trained model is used to make predictions or decisions (outputs) based on new data (inputs). Corrupting a model during this phase involves providing it with manipulated inputs to alter its functioning, leading to incorrect outputs.<\/p>\n<p>For example, in the case of a model trained for object recognition, such an attack might involve using a modified image. The modification is carried out using algorithms that generate a perturbation applied to the original image. This perturbation subtly alters some pixels, remaining imperceptible to the human eye but detectable by the neural network, which consequently produces an incorrect classification.<\/p>\n<p>Another category of digital attacks involves the contamination of training datasets, known as Poisoning Attacks. This type of attack manipulates the dataset by introducing specific biases or censoring relevant information, negatively affecting the model&#8217;s learning process.<\/p>\n<h5><b>What about in the physical world?<\/b><\/h5>\n<p>Attacks in the physical world exclusively target the inference phase. An interesting example comes from research demonstrating that it is possible to compromise the computer vision systems of autonomous vehicles by applying stickers to road signs, causing the system to misinterpret their meaning. Here too, Adversarial Examples are generated using algorithms that overlay a layer of noise onto the original image. For the human eye, which relies on a semantic perception of objects, the meaning of the sign remains unchanged. However, for a computer vision system analysing the individual pixels of an image, these small modifications can be significant, resulting in classification errors.<\/p>\n<p>Another example of Adversarial Attacks in the real world pertains to Large Language Models (LLMs). Due to the vast amount of data used during their training phase, these models can generate text containing sensitive or inappropriate information. To mitigate this, researchers have implemented post-processing techniques that block the release of certain outputs. However, some prompts can bypass these safeguards to produce the desired outputs.<\/p>\n<p>In these cases, Adversarial Examples take on different meanings depending on whether they are interpreted by a machine or a human. The prompts, generated using symbols and characters that form nonsensical texts for a human reader, can deceive the model and compromise its functioning.<\/p>\n<figure>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_1.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"FABIO GNASSI_PAU LABARTA_MACHINE LEARNING_THE BUNKER MAGAZINE_01\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTQzNjUsInVybCI6Imh0dHBzOlwvXC93d3cudGhlLWJ1bmtlci5pdFwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL3N0b3BfMS5qcGcifQ%3D%3D\"><br \/>\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"320\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_1.jpg\" alt=\"\" srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_1.jpg 850w, https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_1.jpg 600w, https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_1-768x289.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t<\/a><figcaption><\/figcaption><\/figure>\n<h5><b>How can models be protected from these attacks?<\/b><\/h5>\n<p>When discussing the security of machine learning models, it is crucial to consider the inherent asymmetry between the efforts required to defend a model and those needed to attack it. Models developed over months by teams of expert researchers, using GPU clusters and costing millions of dollars, can be compromised within hours. It is, therefore, much easier to attack a model than to defend it.<\/p>\n<p>Researchers designing a model are aware of the risks posed by Adversarial Examples, which is why they have developed several techniques to counter such attacks. One of the most common is Adversarial Training, which involves creating synthetic data using Adversarial Techniques and incorporating them into the training process. For example, if training a computer vision model to recognise images of cats, the dataset would include both authentic and manipulated images of cats. This teaches the model that, despite the corruption, the images still represent the same subject.<\/p>\n<p>Regarding Poisoning Attacks, particularly in the case of Large Language Models (LLMs), it is important to highlight how the presence of fake news or malicious information is closely linked to how these models are trained. For years, training approaches relied on constructing enormous text datasets, often without paying close attention to the content of such data. In other words, vulnerabilities introduced by an Adversarial Attack could directly stem from the dataset creation phase.<\/p>\n<p>In recent years, however, there has been a shift in approach: researchers now aim to develop smaller, more efficient, and secure models built using better-curated datasets. This increased focus on data quality represents a significant step towards reducing the likelihood of compromising a model&#8217;s effectiveness.<\/p>\n<h1>READ MORE<\/h1>\n<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Adversarial Examples: Hidden threats to neural networks\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/adversarial-examples-hidden-threats-to-neural-networks\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_2.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/stop_2.jpg\" width=\"763\" height=\"576\"  alt=\"FABIO GNASSI_PAU LABARTA_MACHINE LEARNING_THE BUNKER MAGAZINE_00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/adversarial-examples-hidden-threats-to-neural-networks\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tAdversarial Examples: Hidden threats to neural networks<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/adversarial-examples-hidden-threats-to-neural-networks\/\" rel=\"bookmark\">Adversarial Examples: Hidden threats to neural networks<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Latent Structures: Between Generative Models and Contemporary Design\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/latent-structures-between-generative-models-and-contemporary-design\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Zero_Carbon_Futures_giff-thegem-product-justified-square-double-page-l.gif 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Zero_Carbon_Futures_giff-thegem-product-justified-square-double-page-l.gif\" width=\"1000\" height=\"1199\"  alt=\"FABIO GNASSI_GEORGE GUIDA_NERF_THE BUNKER MAGAZINE-00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/latent-structures-between-generative-models-and-contemporary-design\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tLatent Structures: Between Generative Models and Contemporary Design<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/latent-structures-between-generative-models-and-contemporary-design\/\" rel=\"bookmark\">Latent Structures: Between Generative Models and Contemporary Design<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Internet is Broken, and It\u0092s Up to Us to Fix It. Valerio Bassan&#8217;s Manifesto\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/internet-is-broken-and-its-up-to-us-to-fix-it-valerio-bassans-manifesto\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/blockhain-1-thegem-product-justified-square-double-page-l.webp 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/blockhain-1-thegem-product-justified-square-double-page-l.webp\" width=\"1000\" height=\"1097\"  alt=\"blockhain (1)\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/internet-is-broken-and-its-up-to-us-to-fix-it-valerio-bassans-manifesto\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tInternet is Broken, and It\u0092s Up to Us to Fix It. Valerio Bassan&#8217;s Manifesto<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/internet-is-broken-and-its-up-to-us-to-fix-it-valerio-bassans-manifesto\/\" rel=\"bookmark\">Internet is Broken, and It\u0092s Up to Us to Fix It. Valerio Bassan&#8217;s Manifesto<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"From Bauhaus to AI: Moholy-Nagy&#8217;s vision reinterpreted by David Szauder\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/from-bauhaus-to-ai-moholy-nagys-vision-reinterpreted-by-david-szauder\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/LAM_SL_Szauder-David-Ariel_02-scaled-1-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/LAM_SL_Szauder-David-Ariel_02-scaled-1-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"ALESSANDRO MANCINI_David Szauder_THE BUNKER MAGAZINE_01\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/from-bauhaus-to-ai-moholy-nagys-vision-reinterpreted-by-david-szauder\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tFrom Bauhaus to AI: Moholy-Nagy&#8217;s vision reinterpreted by David Szauder<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/from-bauhaus-to-ai-moholy-nagys-vision-reinterpreted-by-david-szauder\/\" rel=\"bookmark\">From Bauhaus to AI: Moholy-Nagy&#8217;s vision reinterpreted by David Szauder<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Light, Sound and Space: NONOTAK&#8217;s immersive experience at the Videocity Awards\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/light-sound-and-space-nonotaks-immersive-experience-at-the-videocity-awards\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Nonotak_SHIRO-4-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Nonotak_SHIRO-4-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"ALESSANDRO MANCINI_NONOTAK_THE BUNKER MAGAZINE_00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/light-sound-and-space-nonotaks-immersive-experience-at-the-videocity-awards\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tLight, Sound and Space: NONOTAK&#8217;s immersive experience at the Videocity Awards<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/light-sound-and-space-nonotaks-immersive-experience-at-the-videocity-awards\/\" rel=\"bookmark\">Light, Sound and Space: NONOTAK&#8217;s immersive experience at the Videocity Awards<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Algorithmic Opacity and Transparency: it is possible or desirable to shed light on Black Boxes?\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/algorithmic-opacity-and-transparency-it-is-possible-or-desirable-to-shed-light-on-black-boxes\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/metal-chain-trapped-semiconductor-innovation-idea-generated-by-ai-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/metal-chain-trapped-semiconductor-innovation-idea-generated-by-ai-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1097\"  alt=\"CLAUDIO AGOSTI_FABIO GNASSI_THE BUNKER MAGAZINE_03\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/algorithmic-opacity-and-transparency-it-is-possible-or-desirable-to-shed-light-on-black-boxes\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tAlgorithmic Opacity and Transparency: it is possible or desirable to shed light on Black Boxes?<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/algorithmic-opacity-and-transparency-it-is-possible-or-desirable-to-shed-light-on-black-boxes\/\" rel=\"bookmark\">Algorithmic Opacity and Transparency: it is possible or desirable to shed light on Black Boxes?<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"The cyberpunk and existentialist art of Riccardo Benassi lands at MAXXI\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/the-cyberpunk-and-existentialist-art-of-riccardo-benassi-lands-at-maxxi\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/MAXXI-BVLGARI-PRIZE_RiccardoBenassi_ASSENZAHAH-ESSENZAHAH-2024_ph.MUSA_-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/MAXXI-BVLGARI-PRIZE_RiccardoBenassi_ASSENZAHAH-ESSENZAHAH-2024_ph.MUSA_-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"ALESSANDRO MANCINI_BENASSI_\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/the-cyberpunk-and-existentialist-art-of-riccardo-benassi-lands-at-maxxi\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tThe cyberpunk and existentialist art of Riccardo Benassi lands at MAXXI<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/the-cyberpunk-and-existentialist-art-of-riccardo-benassi-lands-at-maxxi\/\" rel=\"bookmark\">The cyberpunk and existentialist art of Riccardo Benassi lands at MAXXI<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Gaming, AR and metaverse: Raffaella Camera talks about the digital future of branding\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/gaming-ar-and-metaverse-raffaella-camera-talks-about-the-digital-future-of-branding\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/image-1-1-thegem-product-justified-square-double-page-l.webp 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/image-1-1-thegem-product-justified-square-double-page-l.webp\" width=\"1000\" height=\"1080\"  alt=\"ALESSANDRO MANCINI_RAFFAELLA CAMERA_THEBUNKER MAGAZINE_00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/gaming-ar-and-metaverse-raffaella-camera-talks-about-the-digital-future-of-branding\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tGaming, AR and metaverse: Raffaella Camera talks about the digital future of branding<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/gaming-ar-and-metaverse-raffaella-camera-talks-about-the-digital-future-of-branding\/\" rel=\"bookmark\">Gaming, AR and metaverse: Raffaella Camera talks about the digital future of branding<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Light as a Universal Language: the Art of Federica Di Carlo lands in Giza\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/light-as-a-universal-language-the-art-of-federica-di-carlo-lands-in-giza\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/I-SEE-I-SEE-Federica-Di-Carlo-Zoom-2-Pyramids-Giza-@federicadicarlostudio-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/I-SEE-I-SEE-Federica-Di-Carlo-Zoom-2-Pyramids-Giza-@federicadicarlostudio-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"ALESSANDRO MANCINI_FEDERICA DI CARLO_THE BUNKERMAGAZINE_00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/light-as-a-universal-language-the-art-of-federica-di-carlo-lands-in-giza\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tLight as a Universal Language: the Art of Federica Di Carlo lands in Giza<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/light-as-a-universal-language-the-art-of-federica-di-carlo-lands-in-giza\/\" rel=\"bookmark\">Light as a Universal Language: the Art of Federica Di Carlo lands in Giza<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Exceeding Limits: Intersections and the Evolution of Marketing in the Age of AI\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/exceeding-limits-intersections-and-the-evolution-of-marketing-in-the-age-of-ai\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/intersections-2023-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/intersections-2023-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"MANILA ALFANO_THE BUNKER MAGAZINE_INTERSECTION_00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/exceeding-limits-intersections-and-the-evolution-of-marketing-in-the-age-of-ai\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tExceeding Limits: Intersections and the Evolution of Marketing in the Age of AI<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/exceeding-limits-intersections-and-the-evolution-of-marketing-in-the-age-of-ai\/\" rel=\"bookmark\">Exceeding Limits: Intersections and the Evolution of Marketing in the Age of AI<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Crypto Coffer: an Investigation into the Autonomy and Value of Art\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/crypto-coffer-an-investigation-into-the-autonomy-and-value-of-art\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/ENXUTO-LOVE-CryptoCoffer-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/ENXUTO-LOVE-CryptoCoffer-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"CRIPTOCOFFER_FABIO GNASSI_ENXUTO AND LOVE_ THE BUNKER MAGAZINE_00\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/crypto-coffer-an-investigation-into-the-autonomy-and-value-of-art\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tCrypto Coffer: an Investigation into the Autonomy and Value of Art<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/crypto-coffer-an-investigation-into-the-autonomy-and-value-of-art\/\" rel=\"bookmark\">Crypto Coffer: an Investigation into the Autonomy and Value of Art<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Behind the VAIA philosophy: from circularity to the know-how of local craftsmen\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/behind-the-vaia-philosophy-from-circularity-to-the-know-how-of-local-craftsmen\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Laboratorio_Ph.Monica_Smaniotto-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Laboratorio_Ph.Monica_Smaniotto-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"ALESSANDRO MANCINI_VAIA_THE BUNKER MAGAZINE_01\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/behind-the-vaia-philosophy-from-circularity-to-the-know-how-of-local-craftsmen\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tBehind the VAIA philosophy: from circularity to the know-how of local craftsmen<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/behind-the-vaia-philosophy-from-circularity-to-the-know-how-of-local-craftsmen\/\" rel=\"bookmark\">Behind the VAIA philosophy: from circularity to the know-how of local craftsmen<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Rethinking power structures: the promises of decentralised governance\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/rethinking-power-structures-the-promises-of-decentralised-governance\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/673266687853364_LKO-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/673266687853364_LKO-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"PRIMAVERA DE FILIPPI_THE BUNKER MAGAZINE_01\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/rethinking-power-structures-the-promises-of-decentralised-governance\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tRethinking power structures: the promises of decentralised governance<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/rethinking-power-structures-the-promises-of-decentralised-governance\/\" rel=\"bookmark\">Rethinking power structures: the promises of decentralised governance<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Poetics and Practice of Technological Error\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/poetics-and-practice-of-technological-error\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Margine-Dentato-2022-arduino-plexiglass-servomotori.-At-Artiglieria.-PH-Nicola-Rossini-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Margine-Dentato-2022-arduino-plexiglass-servomotori.-At-Artiglieria.-PH-Nicola-Rossini-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"MOZZARELLA LIGHT_THE BUNKER MAGAZINE_05\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/poetics-and-practice-of-technological-error\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tPoetics and Practice of Technological Error<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/poetics-and-practice-of-technological-error\/\" rel=\"bookmark\">Poetics and Practice of Technological Error<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Digital Rights of the local and global society\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/digital-rights-of-the-local-and-global-society\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/LUNA-BIANCHI_THE-BUNKER_08-scaled-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/LUNA-BIANCHI_THE-BUNKER_08-scaled-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"Woman using virtual screen futuristic technology\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/digital-rights-of-the-local-and-global-society\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tDigital Rights of the local and global society<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/digital-rights-of-the-local-and-global-society\/\" rel=\"bookmark\">Digital Rights of the local and global society<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"The great deception of the technological revolutions\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/the-great-deception-of-the-technological-revolutions\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/THE-BUNKER-MAGAZINE-Intervista-di-Alessandro-Mancini-a-Diletta-Huyskes-scaled-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/THE-BUNKER-MAGAZINE-Intervista-di-Alessandro-Mancini-a-Diletta-Huyskes-scaled-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"THE BUNKER MAGAZINE Intervista di Alessandro Mancini a Diletta Huyskes\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/the-great-deception-of-the-technological-revolutions\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tThe great deception of the technological revolutions<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/the-great-deception-of-the-technological-revolutions\/\" rel=\"bookmark\">The great deception of the technological revolutions<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/transparent-thegem-product-justified-square-double-page-l.png\" width=\"1000\" height=\"1200\"  alt=\"Art and Emoticons: the language of emotions\" style=\"max-width: 110%\" \/>\n\t\t<\/picture>\n\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/art-and-emoticons-the-language-of-emotions\/\">\t\t<picture><source srcset=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Claire-Fontaine-Left-Right-2023-Pescia-Fiorentina.-Courtesy-the-artist-and-Hypermaremma-photo-credit-Iacopo-Ceravolo-thegem-product-justified-square-double-page-l.jpg 1x\"   sizes=\"100vw\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.the-bunker.it\/wp-content\/uploads\/2025\/11\/Claire-Fontaine-Left-Right-2023-Pescia-Fiorentina.-Courtesy-the-artist-and-Hypermaremma-photo-credit-Iacopo-Ceravolo-thegem-product-justified-square-double-page-l.jpg\" width=\"1000\" height=\"1200\"  alt=\"Claire Fontaine, Left &amp; Right, 2023, Pescia Fiorentina. Courtesy the artist and Hypermaremma, photo credit Iacopo Ceravolo\" \/>\n\t\t<\/picture>\n\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/art-and-emoticons-the-language-of-emotions\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tArt and Emoticons: the language of emotions<br \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.the-bunker.it\/en\/art-and-emoticons-the-language-of-emotions\/\" rel=\"bookmark\">Art and Emoticons: the language of emotions<\/a>\n\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.the-\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although the functioning of machine learning algorithms may seem abstract and difficult to decipher, they rely on a series of structured processes that make them vulnerable to specific threats. Understanding the risks these tools are exposed to is essential for developing greater awareness in their use.<\/p>\n","protected":false},"author":8,"featured_media":1396,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"class_list":["post-1908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/posts\/1908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/comments?post=1908"}],"version-history":[{"count":0,"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/posts\/1908\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/media\/1396"}],"wp:attachment":[{"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/media?parent=1908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab.the-bunker.it\/en\/wp-json\/wp\/v2\/categories?post=1908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}