This defense model can be deployed Within the Confidential Computing surroundings (Figure three) and sit with the initial design to supply responses to an inference block (Figure 4). This enables the AI system to make your mind up on remedial actions from the celebration of an attack. Confidential computing is usually a list of hardware-primarily