Publisher
Springer International Publishing
Reference22 articles.
1. Clark, G., Doran, M., Glisson, W.: A malicious attack on the machine learning policy of a robotic system. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 516–521. IEEE (2018)
2. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2017)
3. Choi, C.Q.: 7 revealing ways AIs fail: neural networks can be disastrously brittle, forgetful, and surprisingly bad at math. IEEE Spectr. 58(10), 42–47 (2021)
4. Kotenko, I., Chechulin, A.: Computer attack modeling and security evaluation based on attack graphs. In: 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), pp. 614–619. IEEE (2013)
5. Gorodetski, V., Kotenko, I.: The multi-agent systems for computer network security assurance: frameworks and case studies. In: 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS 2002), pp. 297–302. IEEE (2002)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Countering Adversarial Zeroth Order Optimization Attacks Based on Neural-Cleanse, Gaussian and Poisson Noise Adding;2024 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM);2024-05-20
2. Attacks Against Machine Learning Systems: Analysis and GAN-based Approach to Protection;Proceedings of the Seventh International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’23);2023