人工智能的逆向工程——反向智能研究综述

Translated title of the contribution: Survey on Reverse-engineering Artificial Intelligence

Chang Sheng Li*, Shi Ye Wang, Yan Ming Li, Cheng Zhe Zhang, Ye Yuan, Guo Ren Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

In the era of big data, artificial intelligence, especially the representative technologies of machine learning and deep learning, has made great progress in recent years. As artificial intelligence has been widely used to various real-world applications, the security and privacy problems of artificial intelligence is gradually exposed, and has attracted increasing attention in academic and industry communities. Researchers have proposed many works focusing on solving the security and privacy issues of machine learning from the perspective of attack and defense. However, current methods on the security issue of machine learning lack of the complete theory framework and system framework. This survey summarizes and analyzes the reverse recovery of training data and model structure, the defect of the model, and gives the formal definition and classification system of reverse-engineering artificial intelligence. In the meantime, this survey summarizes the progress of machine learning security on the basis of reverse-engineering artificial intelligence, where the security of machine learning can be taken as an application. Finally, the current challenges and future research directions of reverse-engineering artificial intelligence are discussed, while building the theory framework of reverse-engineering artificial intelligence can promote the develop of artificial intelligence in a healthy way.

Translated title of the contributionSurvey on Reverse-engineering Artificial Intelligence
Original languageChinese (Traditional)
Pages (from-to)712-732
Number of pages21
JournalRuan Jian Xue Bao/Journal of Software
Volume34
Issue number2
DOIs
Publication statusPublished - 2023

Fingerprint

Dive into the research topics of 'Survey on Reverse-engineering Artificial Intelligence'. Together they form a unique fingerprint.

Cite this