Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
{{output}}
This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. ... ...