Cargando…
Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on t...
Autores principales: | Berghoff, Christian, Neu, Matthias, von Twickel, Arndt |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Frontiers Media S.A.
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7931957/ https://www.ncbi.nlm.nih.gov/pubmed/33693396 http://dx.doi.org/10.3389/fdata.2020.00023 |
Ejemplares similares
-
AI for Not Bad
por: Moore, Jared
Publicado: (2019) -
Opportunities in Open Science With AI
por: Wang, Kuansan
Publicado: (2019) -
Editorial: Bayesian Inference and AI
por: Tang, Niansheng, et al.
Publicado: (2022) -
Leveraging extreme scale analytics, AI and digital twins for maritime digitalization: the VesselAI architecture
por: Ilias, Loukas, et al.
Publicado: (2023) -
On the purpose of meaningful human control of AI
por: Davidovic, Jovana
Publicado: (2023)