최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.3, 2023년, pp.577 - 589
박규도 (국군방첩사령부 국방보안연구소) , 이영란 (국군방첩사령부 국방보안연구소)
Ministry of National Defense plans to harness AI as a key technology to bolster overall defense capability for cultivation of an advanced strong military based on science and technology based on Defense Innovation 4.0 Plan. However, security threats due to the characteristics of AI can be a real thr...
McKinsey Global Institute, "Notes?from the AI frontier: Modeling the?impact of AI on the world economy,"?https://www.mckinsey.com/featured-insights/artificial-intelligence/notes-from-the-ai-frontier-applications-and-value-of-deep-learning, Accessed,?Feb. 2023
Ministry of National Defense, "The?Basic Plan of Defense Innovation?4.0," Mar. 2023
OECD, "The OECD Artificial Intelligence(AI) Principles," May. 2019
Europian Commision High-Level?Expert Group on Artificial?Intelligence, "Ethical Guidelines for Trustworthy AI," Apr. 2019
Ministry of Science and Technology, "Strategy to Realize Artificial?Intelligence Trustworthy for Everyone," May. 2019
U.S. Department of Defense, "DOD Adopts Ethical Principles for Artificial Intelligence" Feb. 2020
Sohee Park, Daeseon Choi, "Artificial?Intelligence Security Issue," Journal?of the Korea Institute of Information Security & Cryptology, 27(3), pp.27-32, Jun. 2017
Seulgi Lee, et al, "Research Trend in Attacks of Machine Learning Model," Journal of the Korea Institute of Information Security & Cryptology, 29(6), pp. 67-74, Dec .2019
Gwonsang Ryu, Daeseon Choi, "Reseach Trend in Artificial?Intelligence Security Attack and Defense," Journal of the Korea Institute of Information Security & Cryptology, 30(5), pp. 93-99, Oct. 2020
Samuli Laato, et al, "AI Governance in the System Development Life Cycle: Insights on Responsible Machine Learning Engineering,"?IEEE/ACM 1st International Conference on AI Engineering - Software Engineering for AI(CAIN), pp.113-123, Jun. 2022
Erick Galinkin, "Towards a Responsible AI Development Lifecycle: Lessons from Information Security",arXiv preprint arXiv: 2203.02958, Mar. 2022
Yoon Junghyun, "Issues and Prospects of AI Utilization in the Defense Field," STEPI Insight, pp. 1-55, Aug. 2021
Keun Ha Choi, et al, "The?Implications to ROK Armed Forces?from the Artificial Intelligence?Strategy of U.S. Department of?Defense and Army," Journal of the?Korea Association of Defense Industry?Studies, 27(1), pp. 41-52, Jun. 2020
Ministry of National Defense,?"Instruction on Defense Informationization," May. 2022
Ministry of Science and Technology,?"Framework Act on Intelligent?Informatization," Jun. 2020
Kwang-Chun Go, "Improvement of?the Acquisition Procedure for?Defense Information System," KIDA?Defense Issues & Analyses,?1916(22-37), Oct.
Sung Rim Cho, et al, "Development?of the Information Security?Methodology for Defense Organization," Korea Society of IT?Services, 12(4), pp. 77-90, Dec.?2013
ISO, "ISO/IEC 23053: Framework?for Artificial Intelligence(AI) Systems?Using Machine Learning(ML)," Jun.?2022
NIST, "AI Risk Management Framework," Jan. 2023
ISO, "ISO/IEC TR 24028: Overview?of Trustworthiness in Artificial?Intelligence," May. 2020
"Poison attacks against machine?learning, Security and spam-detection programs could be?affected," The Kurzweil Accelerating?Intelligence, July. 2012
Y. Yao, et al, "Latent Backdoor?Attacks on Deep Neural Networks,"?Proceedings of the 2019 ACM?SIGSAC Conference on Computer?and Communications Security, pp.?2041-2055, Nov. 2019
D. Song, "AI and Security: Lessons, Challenges, and Future Directions, "IEEE Symposium on Security and Privacy, 1st Deep Learning and Security Workshop, May. 2018
Hyun Kwon, Youngchul Kim, "Trend in Technology of Adversarial Examples in Deep Learning Model,"?Journal of the Korea Institute of?Information Security & Cryptology, 31(2), pp. 5-12, Apr. 2021
Hyun Kwon, et al, "Research Trend in Evasion Attacks of AI Security Problems," Communications of the Korean Institute of Information Scientists and Engineers, 36(2), pp.32-36, Feb. 2018
The Pytorch Team, "Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022", https://pytorch.org/blog/compromised-nightly-dependency/#how-to-check-if-your-python-environment-is-affected, Accessed, Feb. 2023
Ax Sharma, "PyTorch discloses malicious dependency chain compromise over holidays," https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/, Accessed, Jan. 2023
Chan Ho Jeong, Hyun Kwon, "A Study on Adversarial Examples for Image-Based Deep Learning Model?in the Military," Proceedings of?Symposium of the Korean Institute of communications and Information Sciences, pp. 1452-1453, Jun. 2021
W. Brendel, et al, "Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models," International Conference on Learning Representations, Feb. 2018
Yoonsoo An, Daeseon Choi, "Model?Type Inference Attack Using Output?of Black-box AI Model," Journal of?the Korea Institute of Information?Security & Cryptology, 32(5), pp.?817-826, Oct.
Ministry of Science and Technology,?Telecommunications Technology?Association, "Guideline for Trustworthy AI Development," Jan. 2022
Seyong Kim, et al, "A Study on the?Strategic Application of National?Defense Data for the Construction?of Smart Forces in the 4th IR,"?Convergence Security Journal,?20(4), pp. 113-123, Oct. 2020
Ministry of National Defense,?"Second Session of the Defense Data?Management Committee Held by?Ministry of National Defense," Press?Release, Apr. 2023
Financial Security Institute,?"Guideline for Financial Sector AI?Security," Apr. 2023
Tramer, Florian, et al. "Ensemble?adversarial training: Attacks and?Defenses." arXiv preprint?arXiv:1705.07204, Apr. 2020
J. Jia, et al, "Mem Guard: Defending against Black-Box Membership Inference Attacks via Adversarial?Examples," Proceedings of the2019ACM SIGSAC Conference on Computer and Communications Security, pp. 259-274, Dec. 2019
DARPA, "Explainable Artificial?Intelligence," Aug. 2016
Donghan Oh, "Utilization of?Artificial Intelligence Technology in the Military and Suggestion of XAI Technology Application Direction,"?Journal of Digital Contents Society,23(5), pp. 943-951, May.
Yongbok Lee, et al, "Development of?Artificial Intelligence Weapon System Test and Evaluation Methods: Performance Evaluation of?the Classification Model," Journal of?Applied Reliability, 22(1), pp. 1-9,Mar.
Woo-sung Yang, et al, "Korean Security Risk Management Framework for the Application of?Defense Acquisition System,"?Journal of the Korea Institute of?Information Security & Cryptology, 32(6), pp. 1183-1192, Dec. 2022?
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.