Security, privacy, and robustness for trustworthy AI systems: A review

被引:4
|
作者
Saeed, Mozamel M. [1 ]
Alsharidah, Mohammed [1 ]
机构
[1] Prince Sattam bin Abdulaziz Univ, Dept Comp Sci, Al Kharj, Saudi Arabia
关键词
AI Systems; Privacy; Robustness; Security; Trustworthy; HOMOMORPHIC ENCRYPTION; ERROR-DETECTION; HARDWARE CONSTRUCTIONS; ALGORITHM; NETWORK;
D O I
10.1016/j.compeleceng.2024.109643
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This review article provides a comprehensive exploration of the key pillars of trustworthy AI: security privacy and robustness. The article delved into security measures both traditional and cutting edge identifying emerging threats and challenges in ever ever-evolving landscape of artificial intelligence (AI) the discussion extends to advanced encryption techniques and imperative privacy preservation, emphasizing the ethical consideration inherent in safeguarding user data. The robustness and adversarial attack on AI, present techniques for the robustness model and ensure model interpretability and explainability through AI. The exploration of federated learning (FL) elucidates its conceptual foundations and intricate interplay between security, privacy, and collaborative model training. Differential privacy (DP) outlines insights into its application, and challenges. The ethical consideration section scrutinized bias and fairness in AI. The article concludes with an examination of emerging technologies in AI security and privacy anticipating challenges. This review article serves as a comprehensive guide to navigating the complex terrain of trustworthy AI.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Debiasing Strategies for Conversational AI: Improving Privacy and Security Decision-Making
    Anna Leschanowsky
    Birgit Popp
    Nils Peters
    Digital Society, 2023, 2 (3):
  • [42] Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    IEEE ACCESS, 2021, 9 (09): : 18706 - 18721
  • [43] Privacy and Robustness in Federated Learning: Attacks and Defenses
    Lyu, Lingjuan
    Yu, Han
    Ma, Xingjun
    Chen, Chen
    Sun, Lichao
    Zhao, Jun
    Yang, Qiang
    Yu, Philip S.
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (07) : 8726 - 8746
  • [44] AI-based Security Design of Mobile Crowdsensing Systems: Review, Challenges and Case Studies
    Zhang, Yuegian
    Kantarci, Burak
    2019 13TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE) / 10TH INTERNATIONAL WORKSHOP ON JOINT CLOUD COMPUTING (JCC) / IEEE INTERNATIONAL WORKSHOP ON CLOUD COMPUTING IN ROBOTIC SYSTEMS (CCRS), 2019, : 17 - 26
  • [45] Privacy and Security in Mobile Health Apps: A Review and Recommendations
    Borja Martínez-Pérez
    Isabel de la Torre-Díez
    Miguel López-Coronado
    Journal of Medical Systems, 2015, 39
  • [46] A review of trust management, security and privacy policy languages
    De Coi, Juri Luca
    Olmedilla, Daniel
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 483 - 490
  • [47] A Comprehensive Review on Security and Privacy Preservation in Cloud Environment
    Bingu, Rajesh
    Jothilakshmi, S.
    Srinivasu, N.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2021, 2022, 93 : 719 - 738
  • [48] A Review of the State of the Art in Privacy and Security in the eHealth Cloud
    Sahi, Aqeel
    Lai, David
    Li, Yan
    IEEE ACCESS, 2021, 9 : 104127 - 104141
  • [49] Security and privacy for the Internet of Things
    Rullo, Antonino
    Ianni, Michele
    Serra, Edoardo
    FRONTIERS IN COMPUTER SCIENCE, 2023, 5