Survey of Security Attack and Defense Strategies for Artificial Intelligence Model

被引:0
|
作者
Qin, Zhen [1 ]
Zhuang, Tianming [1 ]
Zhu, Guosong [1 ]
Zhou, Erqiang [1 ]
Ding, Yi [1 ]
Geng, Ji [1 ]
机构
[1] Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China), Chengdu,610054, China
关键词
Deep learning;
D O I
10.7544/issn1000-1239.202440449
中图分类号
学科分类号
摘要
引用
收藏
页码:2627 / 2648
相关论文
共 50 条
  • [41] Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods
    Khalaf, Bashar Ahmed
    Mostafa, Salama A.
    Mustapha, Aida
    Mohammed, Mazin Abed
    Abduallah, Wafaa Mustafa
    IEEE ACCESS, 2019, 7 : 51691 - 51713
  • [42] Design of Computer Network Security Defense System Based on Artificial Intelligence and Neural Network
    Bian, Lu
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [43] Survey of Textual Backdoor Attack and Defense
    Zheng M.
    Lin Z.
    Liu Z.
    Fu P.
    Wang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (01): : 221 - 242
  • [44] A Survey on Latest Botnet Attack and Defense
    Zhang, Lei
    Yu, Shui
    Wu, Di
    Watters, Paul
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 53 - 60
  • [45] Attack and defense in the layered cyber-security model and their (1 ± ε)-approximation schemes
    Mukdasanit, Supachai
    Kantabutra, Sanpawat
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2021, 115 : 54 - 63
  • [46] Comprehensive survey of artificial intelligence techniques and strategies for climate change mitigation
    Amiri, Zahra
    Heidari, Arash
    Navimipour, Nima Jafari
    ENERGY, 2024, 308
  • [47] A Survey of Privacy Risks and Mitigation Strategies in the Artificial Intelligence Life Cycle
    Shahriar, Sakib
    Allana, Sonal
    Hazratifard, Seyed Mehdi
    Dara, Rozita
    IEEE ACCESS, 2023, 11 : 61829 - 61854
  • [48] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [49] A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks
    Deldjoo, Yashar
    Di Noia, Tommaso
    Merra, Felice Antonio
    ACM COMPUTING SURVEYS, 2021, 54 (02)
  • [50] A survey of artificial intelligence strategies for automatic detection of sexually explicit videos
    Jenny Cifuentes
    Ana Lucila Sandoval Orozco
    Luis Javier García Villalba
    Multimedia Tools and Applications, 2022, 81 : 3205 - 3222