Cargando…

Vulnerabilities of Connectionist AI Applications: Evaluation and Defense

This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on t...

Descripción completa

Detalles Bibliográficos
Autores principales: Berghoff, Christian, Neu, Matthias, von Twickel, Arndt
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Frontiers Media S.A. 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7931957/
https://www.ncbi.nlm.nih.gov/pubmed/33693396
http://dx.doi.org/10.3389/fdata.2020.00023