AI for Security and Security for AI

66Citations
Citations of this article
141Readers
Mendeley users who have this article in their library.
Get full text

Abstract

On one side, the security industry has successfully adopted some AI-based techniques. Use varies from mitigating denial of service attacks, forensics, intrusion detection systems, homeland security, critical infrastructures protection, sensitive information leakage, access control, and malware detection. On the other side, we see the rise of Adversarial AI. Here the core idea is to subvert AI systems for fun and profit. The methods utilized for the production of AI systems are systematically vulnerable to a new class of vulnerabilities. Adversaries are exploiting these vulnerabilities to alter AI system behavior to serve a malicious end goal. This panel discusses some of these aspects.

Cite

CITATION STYLE

APA

Bertino, E., Kantarcioglu, M., Akcora, C. G., Samtani, S., Mittal, S., & Gupta, M. (2021). AI for Security and Security for AI. In CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (pp. 333–334). Association for Computing Machinery, Inc. https://doi.org/10.1145/3422337.3450357

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free