This defense design is often deployed In the Confidential Computing natural environment (Figure three) and sit with the initial model to supply feed-back to an inference block (determine four). This enables the AI method to choose on remedial actions while in the occasion of the attack. Inference runs in Azure Confidential GPU VMs designed using