This seminar brings together researchers from diverse backgrounds in order to study these questions. Which applications are most likely for an adversary to gain from exploiting machine learning models? Are there particular attacks that will be more prevalent than others? What defense strategies are possible—and practical? What is the cost of these defenses to utility?