Cited 7 time in
Security methods for AI based COVID-19 analysis system: A survey
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Shamshiri, Samaneh | - |
| dc.contributor.author | Sohn, Insoo | - |
| dc.date.accessioned | 2023-04-27T08:40:34Z | - |
| dc.date.available | 2023-04-27T08:40:34Z | - |
| dc.date.issued | 2022-12 | - |
| dc.identifier.issn | 2405-9595 | - |
| dc.identifier.issn | 2405-9595 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/2150 | - |
| dc.description.abstract | Rapid progress and widespread outbreak of COVID-19 have caused devastating influence on the health systems all around the world. The importance of countermeasures to tackle this problem lead to widespread use of Computer Aided Diagnosis (CADs) applications using deep neural networks. The unprecedented success of machine learning techniques, especially deep learning networks in medical images, have led to their recent prominence in improving efficient diagnosis of COVID-19 with increased detection accuracy. However, recent studies in the field of security of AI-based systems revealed that these deep learning models are vulnerable to adversarial attacks. Adversarial examples generated by attack algorithms are not recognizable by the human eye and can easily deceive the state-of-the-art deep learning models, therefore they threaten security-critical learning applications. In this paper, the methodology, results and concerns of recent works on robustness of AI based COVID-19 systems are summarized and discussed. We explore important security concerns related to deep neural networks and review current state-of-the-art defense methods to prevent performance degradation. © 2022 The Author(s) | - |
| dc.format.extent | 8 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | 한국통신학회 | - |
| dc.title | Security methods for AI based COVID-19 analysis system: A survey | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.1016/j.icte.2022.03.002 | - |
| dc.identifier.scopusid | 2-s2.0-85126531061 | - |
| dc.identifier.wosid | 000910539200013 | - |
| dc.identifier.bibliographicCitation | ICT Express, v.8, no.4, pp 555 - 562 | - |
| dc.citation.title | ICT Express | - |
| dc.citation.volume | 8 | - |
| dc.citation.number | 4 | - |
| dc.citation.startPage | 555 | - |
| dc.citation.endPage | 562 | - |
| dc.type.docType | Review | - |
| dc.identifier.kciid | ART002921836 | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.description.journalRegisteredClass | kci | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | Adversarial attack | - |
| dc.subject.keywordAuthor | COVID-19 | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
