Detailed Information

Cited 5 time in webofscience Cited 7 time in scopus
Metadata Downloads

Security methods for AI based COVID-19 analysis system: A survey

Full metadata record
DC Field Value Language
dc.contributor.authorShamshiri, Samaneh-
dc.contributor.authorSohn, Insoo-
dc.date.accessioned2023-04-27T08:40:34Z-
dc.date.available2023-04-27T08:40:34Z-
dc.date.issued2022-12-
dc.identifier.issn2405-9595-
dc.identifier.issn2405-9595-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/2150-
dc.description.abstractRapid progress and widespread outbreak of COVID-19 have caused devastating influence on the health systems all around the world. The importance of countermeasures to tackle this problem lead to widespread use of Computer Aided Diagnosis (CADs) applications using deep neural networks. The unprecedented success of machine learning techniques, especially deep learning networks in medical images, have led to their recent prominence in improving efficient diagnosis of COVID-19 with increased detection accuracy. However, recent studies in the field of security of AI-based systems revealed that these deep learning models are vulnerable to adversarial attacks. Adversarial examples generated by attack algorithms are not recognizable by the human eye and can easily deceive the state-of-the-art deep learning models, therefore they threaten security-critical learning applications. In this paper, the methodology, results and concerns of recent works on robustness of AI based COVID-19 systems are summarized and discussed. We explore important security concerns related to deep neural networks and review current state-of-the-art defense methods to prevent performance degradation. © 2022 The Author(s)-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisher한국통신학회-
dc.titleSecurity methods for AI based COVID-19 analysis system: A survey-
dc.typeArticle-
dc.publisher.location대한민국-
dc.identifier.doi10.1016/j.icte.2022.03.002-
dc.identifier.scopusid2-s2.0-85126531061-
dc.identifier.wosid000910539200013-
dc.identifier.bibliographicCitationICT Express, v.8, no.4, pp 555 - 562-
dc.citation.titleICT Express-
dc.citation.volume8-
dc.citation.number4-
dc.citation.startPage555-
dc.citation.endPage562-
dc.type.docTypeReview-
dc.identifier.kciidART002921836-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorAdversarial attack-
dc.subject.keywordAuthorCOVID-19-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorSecurity-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Electronics and Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Sohn, In Soo photo

Sohn, In Soo
College of Engineering (Department of Electronics and Electrical Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE