Modern artificial intelligence systems largely rely on advanced algorithms, including machine learning techniques such as deep learning. The research community has invested significant efforts in understanding these algorithms, optimally tuning them, and improving their performance, but it has mostly neglected the security facet of the problem. Recent attacks and exploits demonstrated that machine learning-based algorithms are susceptible to attacks targeting computer systems, including backdoors, hardware trojans and fault attacks, but are also susceptible to a range of attacks specifically targeting them, such as adversarial input perturbations. Implementations of machine learning algorithms are often crucial proprietary assets for compan...
The intent of this project is to address the importance of artificial intelligence in cybersecurity ...
Machine learning has become a valuable tool for detecting and preventing malicious activity. However...
This article discusses attack schemes on artificial intelligence systems (on machine learning models...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
In recent years, the development and provision of new systems and services utilizing artificial inte...
The cyber physical systems integrate the sensing, computation, control and networking processes into...
Over the last decade, machine learning (ML) and artificial intelligence (AI) solutions have been wid...
People in the modern era spend most of their lives in virtual environments that offer a range of pub...
134 pagesMachine learning as a technique of automatically constructing programs from past data for m...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
Cyber-physical systems, built from the integration of cyber and physical components, are being used ...
Technology is influencing our lives in numerous ways. With the explosive growth of ubiquitous system...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
The intent of this project is to address the importance of artificial intelligence in cybersecurity ...
Machine learning has become a valuable tool for detecting and preventing malicious activity. However...
This article discusses attack schemes on artificial intelligence systems (on machine learning models...
Machine learning systems are becoming widely adopted and ubiquitous. Not only are there a growth of ...
Machine learning has become a prevalent tool in many computing applications and modern enterprise sy...
In recent years, the development and provision of new systems and services utilizing artificial inte...
The cyber physical systems integrate the sensing, computation, control and networking processes into...
Over the last decade, machine learning (ML) and artificial intelligence (AI) solutions have been wid...
People in the modern era spend most of their lives in virtual environments that offer a range of pub...
134 pagesMachine learning as a technique of automatically constructing programs from past data for m...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
Thesis (Ph.D.)--University of Washington, 2019Deep neural networks have achieved remarkable success ...
Cyber-physical systems, built from the integration of cyber and physical components, are being used ...
Technology is influencing our lives in numerous ways. With the explosive growth of ubiquitous system...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
The intent of this project is to address the importance of artificial intelligence in cybersecurity ...
Machine learning has become a valuable tool for detecting and preventing malicious activity. However...
This article discusses attack schemes on artificial intelligence systems (on machine learning models...