Survey of Security Attack and Defense Strategies for Artificial Intelligence Model

被引:0
|
作者
Qin, Zhen [1 ]
Zhuang, Tianming [1 ]
Zhu, Guosong [1 ]
Zhou, Erqiang [1 ]
Ding, Yi [1 ]
Geng, Ji [1 ]
机构
[1] Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China), Chengdu,610054, China
关键词
Deep learning;
D O I
10.7544/issn1000-1239.202440449
中图分类号
学科分类号
摘要
引用
收藏
页码:2627 / 2648
相关论文
共 50 条
  • [31] Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology
    Shu, Fei
    Chen, ShuTing
    Li, Feng
    Zhang, JianYe
    Chen, Jia
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 475 - 478
  • [32] ElNnGA: An Artificial Intelligence Empowered Scheme for Unknown Attack Recognition and Defense Strategy Recommendation
    Jiale Quan
    Han, Yu
    Zhang, Liumei
    Hu, Yuanjiao
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 411 - 417
  • [33] IN DEFENSE OF ARTIFICIAL INTELLIGENCE RESEARCH
    TRAVIS, LE
    COMMUNICATIONS OF THE ACM, 1962, 5 (01) : 6 - 7
  • [34] Artificial Intelligence Applications in Defense
    Sinchana, C.
    Sinchana, K.
    Afridi, Shahid
    Pooja, M. R.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 727 - 734
  • [35] IN DEFENSE OF ARTIFICIAL-INTELLIGENCE
    HAYES, PJ
    COMMUNICATIONS OF THE ACM, 1992, 35 (12) : 13 - 13
  • [36] Artificial intelligence for defense applications
    Bastian, Nathaniel D.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2021, 18 (03): : 173 - 174
  • [37] An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
    Selvarajan, Shitharth
    Srivastava, Gautam
    Khadidos, Alaa O.
    Khadidos, Adil O.
    Baza, Mohamed
    Alshehri, Ali
    Lin, Jerry Chun-Wei
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [38] CONSTRUCTION OF POWER SYSTEM NETWORK SECURITY DEFENSE BEHAVIOR DECISION-MAKING MODEL BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGY
    HANG F.
    XIE L.
    ZHANG Z.
    HU J.
    Scalable Computing, 2024, 25 (04): : 2614 - 2620
  • [39] An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
    Shitharth Selvarajan
    Gautam Srivastava
    Alaa O. Khadidos
    Adil O. Khadidos
    Mohamed Baza
    Ali Alshehri
    Jerry Chun-Wei Lin
    Journal of Cloud Computing, 12
  • [40] GPU Obfuscation: Attack and Defense Strategies
    Chakraborty, Abhishek
    Xie, Yang
    Srivastava, Ankur
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,