2023
DOI: 10.1016/j.cose.2022.102948
|View full text |Cite
|
Sign up to set email alerts
|

Software vulnerabilities in TensorFlow-based deep learning applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Though they are still under development, AI-powered authentication solutions are becoming more widespread. AI could be employed to identify and take advantage of these systems' flaws to access users' accounts [135], [139], [140]. • Online banking system attacks could be automated using ML.…”
Section: ) Artificial Intelligence Challengementioning
confidence: 99%
“…Though they are still under development, AI-powered authentication solutions are becoming more widespread. AI could be employed to identify and take advantage of these systems' flaws to access users' accounts [135], [139], [140]. • Online banking system attacks could be automated using ML.…”
Section: ) Artificial Intelligence Challengementioning
confidence: 99%
“…Addressing published vulnerabilities without understanding enterprise risk may result in a significant amount of time and effort devoted to vulnerabilities that may not be pertinent to the enterprise (Erola et al , 2022, NVD, Filus and Domańska, 2023; Johnson et al , 2016; Beattie et al , 2002). With the intensity and frequency of ERP attacks increasing over the last decade (Erola et al , 2022; Halbouni et al , 2022), the risk to the organization as these systems control and track the operations of the company (Chaudhry et al , 2012) has also increased considerably.…”
Section: Introductionmentioning
confidence: 99%