Cited 56 time in
Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeong, Doowon | - |
| dc.date.accessioned | 2023-04-28T00:41:18Z | - |
| dc.date.available | 2023-04-28T00:41:18Z | - |
| dc.date.issued | 2020 | - |
| dc.identifier.issn | 2169-3536 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/7168 | - |
| dc.description.abstract | Advances in Artificial Intelligence (AI) have influenced almost every field including computer science, robotics, social engineering, psychology, criminology and so on. Although AI has solved various challenges, potential security threats of AI algorithms and training data have been stressed by AI researchers. As AI system inherits security threats of traditional computer system, the concern about novel cyberattack enhanced by AI is also growing. In addition, AI is deeply connected to physical space (e.g. autonomous vehicle, intelligent virtual assistant), so AI-related crime can harm people physically, beyond the cyberspace. In this context, we represent a literature review of security threats and AI-related crime. Based on the literature review, this article defines the term AI crime and classifies AI crime into 2 categories: AI as tool crime and AI as target crime, inspired by a taxonomy of cybercrime: Computer as tool crime and Computer as tool crime. Through the proposed taxonomy, foreseeable AI crimes are systematically studied and related forensic techniques are also addressed. We also analyze the characteristics of the AI crimes and present challenges that are difficult to be solved with the traditional forensic techniques. Finally, open issues are presented, with emphasis on the need to establish novel strategies for AI forensics. | - |
| dc.format.extent | 15 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
| dc.title | Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/ACCESS.2020.3029280 | - |
| dc.identifier.scopusid | 2-s2.0-85102746807 | - |
| dc.identifier.wosid | 000583550300001 | - |
| dc.identifier.bibliographicCitation | IEEE ACCESS, v.8, pp 184560 - 184574 | - |
| dc.citation.title | IEEE ACCESS | - |
| dc.citation.volume | 8 | - |
| dc.citation.startPage | 184560 | - |
| dc.citation.endPage | 184574 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | ADVERSARIAL ATTACKS | - |
| dc.subject.keywordPlus | SIMILARITY | - |
| dc.subject.keywordPlus | CLOUD | - |
| dc.subject.keywordPlus | CHALLENGES | - |
| dc.subject.keywordPlus | INTRUSION | - |
| dc.subject.keywordPlus | ANALYTICS | - |
| dc.subject.keywordPlus | AGENTS | - |
| dc.subject.keywordAuthor | Artificial intelligence | - |
| dc.subject.keywordAuthor | Tools | - |
| dc.subject.keywordAuthor | Computer crime | - |
| dc.subject.keywordAuthor | Digital forensics | - |
| dc.subject.keywordAuthor | Artificial intelligence | - |
| dc.subject.keywordAuthor | AI crime | - |
| dc.subject.keywordAuthor | AI forensics | - |
| dc.subject.keywordAuthor | security threats | - |
| dc.subject.keywordAuthor | malicious AI | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
