{"version":"1.0","type":"rich","provider_name":"gaks.ai AI Glossary","provider_url":"https://gaks.ai/glossary","title":"Trojan Model — AI Glossary","author_name":"Glenn Katrud Solheim","author_url":"https://gaks.ai","width":600,"height":200,"html":"<div style=\"font-family:sans-serif;border:1px solid #e0e0e0;border-radius:8px;padding:16px;max-width:600px;background:#ffffff;color:#111111;\"><p style=\"margin:0 0 4px;font-size:11px;color:#666;\">AI Glossary — gaks.ai</p><h3 style=\"margin:0 0 8px;font-size:16px;\">Trojan Model</h3><p style=\"margin:0 0 12px;font-size:14px;line-height:1.6;\">A machine learning model that has been deliberately compromised, typically through a backdoor attack during training, so that it behaves normally under most conditions but produces specific, attacker-controlled outputs when a hidden trigger is present in the input. A serious supply chain security concern, particularly when organizations use pre-trained models from untrusted sources without thorough security evaluation.</p><a href=\"https://gaks.ai/glossary/trojan-model\" style=\"font-size:12px;color:#0077aa;\">Source: gaks.ai/glossary/trojan-model →</a></div>"}