999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Special Section on Attacking and Protecting Artificial Intelligence

2021-03-27 16:11:57

Modern Artificial Intelligence(AI)systems largely rely on advanced algorithms,including machine learning techniques such as deep learning.The research community has invested significant efforts in understanding these algorithms,optimally tuning them,and improving their performance,but it has mostly neglected the security facet of the problem.Recent attacks and exploits demonstrated that machine learning-based algorithms are susceptible to attacks targeting computer systems,including backdoors,hardware Trojans and fault attacks,but are also susceptible to a range of attacks specifically targeting them,such as adversarial input perturbations.Implementations of machine learning algorithms are often crucialproprietary assets for companies and thus are required to be protected.It follows that implementations of AI-based algorithms are an attractive target for piracy and illegitimate use and,as such,they need to be protected as allother IPs.This is equally important for machine learning algorithms running on remote servers vulnerable to micro-architectural exploits.

Protecting AI algorithms from all these attacks is not a trivial task.While vast research in hardware and software security have established several sound countermeasures,the specificity of the algorithms used in AI could make such countermeasures ineffective(or simply inapplicable),given the complex and resource intensive nature of the algorithms.The task of protection will become even more difficult in the near future,given the trend where part of the intelligence will be deployed directly into resource constrained cyber-physical systems and IoT devices.AI models themselves should be protected against illegitimate and unauthorized use and distribution.Because of this,IP protection techniques such as watermarking,fingerprinting and attestation have been proposed,but,especially the last two,should be studied more in depth.

To address all these security challenges,two actions are needed.First,we need a complete understanding of the attackers'capabilities.Second,novel and lightweight approaches for protecting AI algorithms,given the distributed level of intelligence,should be conceived and developed,including(but not limited to)obfuscation,finger-printing,homomorphic encryption,and a new set of countermeasures to protect AI algorithms from adversarial input,backdooring and physical attacks.

This Special Section covers problems related to attacking and protecting implementations of AI algorithms,and the use of AI to improve state-of-the-art attacks such as physical attacks.It consists of three articles which are selected for publication after multiple rounds of peer review and scrutiny.An overview of these articles is discussed in the following.

The first article reports different types of adversarial attacks,considering various threat models,followed by a discussion on the efficiency and challenges of state-of-the-art countermeasures against them.It also provides a taxonomy for adversarial learning which can help future research to correctly categorize discovered vulnerabilities and plan protection mechanisms accordingly.The article concludes discussing open problems that can trigger further research on the topic.

The second article takes a step towards disseminating knowledge about the widely popular and critical threat of sidechannel attacks on neuralnetworks.This survey considers and categorizes the most relevant threat models and corresponding attacks with different objectives including recovery of hyperparameters,secret weights and inputs.The article differentiates between types of side-channel attacks like physical,local or remote to highlight the applicability of various attacks and concludes with a discussion of countermeasures.

The third article surveys AI modelownership protection techniques,the majority of them being based on watermarking,reporting advantages and disadvantage of them and highlighting possible research directions.The authors identified that,to date,the most studied technique is watermarking,that has been proposed in white box and black box settings.The articles also survey existing attacks aiming at removing or making ineffective IP protection techniques,and identify fingerprinting and attestation as two approaches are not yet studied in depth.

Overall,the articles accepted cover a wide spectrum of problem providing readers with a perspective on the underlying problem in both breadth and depth.We would like to thank all the authors and reviewers again for their contributions.

主站蜘蛛池模板: 美女毛片在线| 色噜噜在线观看| 亚洲色欲色欲www网| 19国产精品麻豆免费观看| 日韩第九页| 青青操视频免费观看| 婷婷色婷婷| 国产精品自在拍首页视频8| 毛片免费观看视频| 欧美劲爆第一页| 日韩天堂在线观看| 在线看片国产| 一级毛片不卡片免费观看| 国产女主播一区| 在线看片免费人成视久网下载| 亚洲精品无码久久毛片波多野吉| 亚洲日韩精品欧美中文字幕| 欧美精品在线免费| 91欧美在线| 国产一级在线观看www色 | 国产精品偷伦视频免费观看国产| 欧美日韩国产在线播放| 国产av剧情无码精品色午夜| 日韩视频免费| 思思热精品在线8| 国产在线观看91精品| 欧美日本在线播放| 久久久久国产精品熟女影院| 四虎成人精品| 四虎精品免费久久| 婷婷久久综合九色综合88| 一级做a爰片久久免费| 第九色区aⅴ天堂久久香| 久草视频中文| 欧美日韩中文国产| 亚洲美女AV免费一区| 国产成人无码久久久久毛片| 亚洲综合一区国产精品| 重口调教一区二区视频| 91精品免费高清在线| 亚洲精品成人7777在线观看| 97久久免费视频| 国产精品女熟高潮视频| 亚洲美女一区| 97视频精品全国免费观看| 91小视频在线| 亚洲成人精品| 小13箩利洗澡无码视频免费网站| 精品国产www| 福利在线一区| 国产精品私拍99pans大尺度| 伊人久久精品无码麻豆精品 | 手机永久AV在线播放| 久久中文字幕2021精品| 国产色婷婷视频在线观看| 2020极品精品国产| 欧美国产精品不卡在线观看| 丁香六月激情综合| 欧美成人午夜在线全部免费| 免费不卡在线观看av| 欧洲亚洲一区| 大陆国产精品视频| 国产中文一区a级毛片视频 | AV色爱天堂网| 国产精品视频第一专区| 色妞永久免费视频| 91福利一区二区三区| 五月天婷婷网亚洲综合在线| 久久精品无码一区二区日韩免费| 欧美精品成人一区二区在线观看| 福利在线不卡| 福利一区在线| yy6080理论大片一级久久| 另类综合视频| 成人福利在线观看| 一级毛片免费高清视频| av在线人妻熟妇| 99re这里只有国产中文精品国产精品 | 久久久久人妻一区精品| 国产欧美视频综合二区| 国产精品福利一区二区久久| 亚洲毛片一级带毛片基地|