Cargando…
Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on t...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Frontiers Media S.A.
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7931957/ https://www.ncbi.nlm.nih.gov/pubmed/33693396 http://dx.doi.org/10.3389/fdata.2020.00023 |