Login / Signup
Vulnerabilities of Connectionist AI Applications: Evaluation and Defense.
Christian Berghoff
Matthias Neu
Arndt von Twickel
Published in:
Frontiers Big Data (2020)
Keyphrases
</>
neural network
intrusion detection
evaluation method
expert systems
database
information security
network security
gold standard
evaluation methods
clustering algorithm
evaluation measures
evaluation criteria
evaluation model
comparative evaluation
cognitive model