Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on t...
Main Authors: | Christian Berghoff, Matthias Neu, Arndt von Twickel |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2020-07-01
|
Series: | Frontiers in Big Data |
Subjects: | |
Online Access: | https://www.frontiersin.org/article/10.3389/fdata.2020.00023/full |
Similar Items
-
Adversarial attack and defense in reinforcement learning-from AI security view
by: Tong Chen, et al.
Published: (2019-03-01) -
Survey of Image Adversarial Example Defense Techniques
by: LIU Ruiqi, LI Hu, WANG Dongxia, ZHAO Chongyang, LI Boyu
Published: (2023-12-01) -
Review of Artificial Intelligence Adversarial Attack and Defense Technologies
by: Shilin Qiu, et al.
Published: (2019-03-01) -
DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks
by: Fangwei Wang, et al.
Published: (2023-02-01) -
Adversarial attacks and defenses in deep learning
by: LIU Ximeng, et al.
Published: (2020-10-01)