Login / Signup
Vulnerabilities of Connectionist AI Applications: Evaluation and Defence.
Christian Berghoff
Matthias Neu
Arndt von Twickel
Published in:
CoRR (2020)
Keyphrases
</>
website
neural network
genetic algorithm
information systems
comparative evaluation
expert systems
evaluation methods
data sets
artificial intelligence
database systems
information security
gold standard
evaluation model
countermeasures
knowledge representation and reasoning
security risks