{"id":4816,"date":"2022-12-01T19:24:31","date_gmt":"2022-12-02T00:24:31","guid":{"rendered":"http:\/\/skimai.com\/?p=4816"},"modified":"2024-04-29T17:27:40","modified_gmt":"2024-04-29T22:27:40","slug":"%e3%83%96%e3%83%ad%e3%82%b0-%e6%95%b5%e5%af%be%e7%9a%84ai%e6%94%bb%e6%92%83%e3%81%a8%e3%81%af%e4%bd%95%e3%81%8b","status":"publish","type":"post","link":"https:\/\/skimai.com\/ja\/blog-what-is-an-adversarial-ai-attack\/","title":{"rendered":"\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u76ee\u6b21<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u30c8\u30b0\u30eb\u76ee\u6b21\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">\u30c8\u30b0\u30eb<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/skimai.com\/ja\/blog-what-is-an-adversarial-ai-attack\/#What_is_an_Adversarial_AI_Attack\" >\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/skimai.com\/ja\/blog-what-is-an-adversarial-ai-attack\/#Risks_posed_by_an_Adversarial_AI_attack\" >\u6575\u5bfe\u7684AI\u653b\u6483\u304c\u3082\u305f\u3089\u3059\u30ea\u30b9\u30af<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/skimai.com\/ja\/blog-what-is-an-adversarial-ai-attack\/#Examples_of_Adversarial_AI_Attacks\" >\u6575\u5bfe\u7684AI\u653b\u6483\u306e\u4f8b<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/skimai.com\/ja\/blog-what-is-an-adversarial-ai-attack\/#How_to_defend_against_Adversarial_AI_attacks\" >\u6575\u5bfe\u7684AI\u653b\u6483\u304b\u3089\u8eab\u3092\u5b88\u308b\u306b\u306f<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/skimai.com\/ja\/blog-what-is-an-adversarial-ai-attack\/#Conclusion\" >\u7d50\u8ad6<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1><span class=\"ez-toc-section\" id=\"What_is_an_Adversarial_AI_Attack\"><\/span>\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>\u4eba\u5de5\u77e5\u80fd\uff08AI\uff09\u3084\u6a5f\u68b0\u5b66\u7fd2\uff08ML\uff09\u306a\u3069\u306e\u30c7\u30a3\u30fc\u30d7\u30e9\u30fc\u30cb\u30f3\u30b0\u6280\u8853\u306f\u3001\u4f01\u696d\u306b\u3055\u307e\u3056\u307e\u306a\u30d3\u30b8\u30cd\u30b9\u4e0a\u306e\u30e1\u30ea\u30c3\u30c8\u3092\u3082\u305f\u3089\u3059\u3002\u540c\u6642\u306b\u3001\u6575\u5bfe\u7684\u306aAI\u653b\u6483\u306f\u3001\u6700\u65b0\u306e\u30b7\u30b9\u30c6\u30e0\u306b\u3068\u3063\u3066\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u8ab2\u984c\u3068\u306a\u3063\u3066\u3044\u308b\u3002<br \/>\nAI\u653b\u6483\u3068\u306f\uff1fAI\u30e2\u30c7\u30eb\u3092\u6b3a\u304f\u30c7\u30fc\u30bf\u3067\u300c\u9a19\u3059\u300d\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u4e00\u7a2e\u3002\u6575\u5bfe\u7684ML\uff08Adversarial ML\uff09\u3068\u3082\u547c\u3070\u308c\u3001\u4e3b\u306b\u753b\u50cf\u5206\u985e\u3084\u30b9\u30d1\u30e0\u691c\u77e5\u3067\u5831\u544a\u3055\u308c\u3066\u3044\u308b\u3002<br \/>\n\u6b21\u306b\u3001\u6575\u5bfe\u7684AI\u653b\u6483\u304c\u3082\u305f\u3089\u3059\u3055\u307e\u3056\u307e\u306a\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u8aac\u660e\u3057\u3088\u3046\u3002<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risks_posed_by_an_Adversarial_AI_attack\"><\/span>\u6575\u5bfe\u7684AI\u653b\u6483\u304c\u3082\u305f\u3089\u3059\u30ea\u30b9\u30af<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u306b\u3088\u308b\u3068 <a href=\"https:\/\/www.csoonline.com\/article\/3664748\/adversarial-machine-learning-explained-how-attackers-disrupt-ai-and-ml-systems.html\">\u30a2\u30ec\u30af\u30bb\u30a4\u30fb\u30eb\u30d6\u30c4\u30a9\u30d5<\/a> \u6575\u5bfe\u7684\u6a5f\u68b0\u5b66\u7fd2\u306f\u3001ML\u30e2\u30c7\u30eb\u306e\u8106\u5f31\u6027\u3068\u7279\u7570\u6027\u3092\u60aa\u7528\u3059\u308b\u300d\u3002\u4f8b\u3048\u3070\u3001\u6575\u5bfe\u7684\u306aML\u306f\u3001ML\u30d9\u30fc\u30b9\u306e\u53d6\u5f15\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306b\u53d6\u5f15\u306b\u95a2\u3059\u308b\u8aa4\u3063\u305f\u6c7a\u5b9a\u3092\u3055\u305b\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002<\/p>\n<p>\u6575\u5bfe\u7684AI\u653b\u6483\u306fAI\u3084ML\u30b7\u30b9\u30c6\u30e0\u306b\u3069\u306e\u3088\u3046\u306a\u30ea\u30b9\u30af\u3092\u3082\u305f\u3089\u3059\u306e\u304b\uff1f\u4e00\u822c\u7684\u306a\u8abf\u67fb\u7d50\u679c\u3092\u3044\u304f\u3064\u304b\u7d39\u4ecb\u3057\u3088\u3046\uff1a<br \/>\n<strong>\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u30fb\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0<\/strong> \u3053\u306e\u5834\u5408\u3001AI\u653b\u6483\u306f\u81ea\u52d5\u5316\u3092\u7528\u3044\u3066\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u30e6\u30fc\u30b6\u30fc\u30fb\u30d7\u30ed\u30d5\u30a3\u30fc\u30eb\u3092\u300c\u30b9\u30af\u30ec\u30a4\u30d4\u30f3\u30b0\u300d\u3059\u308b\u3002\u305d\u3057\u3066\u3001\u76ee\u7684\u306e\u30d7\u30ed\u30d5\u30a3\u30fc\u30eb\u3092\u300c\u304a\u3073\u304d\u5bc4\u305b\u308b\u300d\u305f\u3081\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u81ea\u52d5\u7684\u306b\u751f\u6210\u3059\u308b\u3002<\/p>\n<p><strong>\u30c7\u30a3\u30fc\u30d7\u30d5\u30a7\u30a4\u30af\uff1a<\/strong> \u4e00\u822c\u7684\u306b\u9280\u884c\u8a50\u6b3a\u3067\u4f7f\u7528\u3055\u308c\u308b\u30c7\u30a3\u30fc\u30d7\u30d5\u30a7\u30a4\u30af\u306f\u3001\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u69d8\u3005\u306a\u60aa\u610f\u306e\u3042\u308b\u76ee\u7684\u3092\u9054\u6210\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u30aa\u30f3\u30e9\u30a4\u30f3\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u3067\u3042\u308b\uff1a<br \/>\n\u6050\u559d\u3068\u5f37\u8981<br \/>\n\u500b\u4eba\u306e\u4fe1\u7528\u3084\u30a4\u30e1\u30fc\u30b8\u3092\u640d\u306a\u3046\u3053\u3068<br \/>\n\u6587\u66f8\u8a50\u6b3a<br \/>\n\u500b\u4eba\u307e\u305f\u306f\u30b0\u30eb\u30fc\u30d7\u306b\u3088\u308b\u5acc\u304c\u3089\u305b\u306e\u305f\u3081\u306e\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2<\/p>\n<p><strong>\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u6f5c\u4f0f\uff1a<\/strong> \u3053\u3053\u3067\u8105\u5a01\u8005\u306fML\u3092\u6d3b\u7528\u3057\u3001\u4e00\u822c\u30e6\u30fc\u30b6\u30fc\u306b\u306f\u666e\u901a\u306b\u898b\u3048\u308b\u300c\u60aa\u610f\u306e\u3042\u308b\u300d\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306e\u4e2d\u306b\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u96a0\u3059\u3002<\/p>\n<p><strong>\u30d1\u30b9\u30ef\u30fc\u30c9\uff1a<\/strong> \u6575\u5bfe\u7684AI\u653b\u6483\u306f\u3001\u5927\u898f\u6a21\u306a\u30d1\u30b9\u30ef\u30fc\u30c9\u306e\u30bb\u30c3\u30c8\u3092\u5206\u6790\u3057\u3001\u30d0\u30ea\u30a8\u30fc\u30b7\u30e7\u30f3\u3092\u751f\u6210\u3059\u308b\u3053\u3068\u3055\u3048\u3067\u304d\u308b\u3002\u8a00\u3044\u63db\u3048\u308c\u3070\u3001\u3053\u308c\u3089\u306e\u653b\u6483\u306f\u30d1\u30b9\u30ef\u30fc\u30c9\u306e\u89e3\u8aad\u30d7\u30ed\u30bb\u30b9\u3092\u3088\u308a\u300c\u79d1\u5b66\u7684\u300d\u306b\u3059\u308b\u3002\u30d1\u30b9\u30ef\u30fc\u30c9\u3068\u306f\u5225\u306b\u3001ML\u306f\u8105\u5a01\u884c\u70ba\u8005\u304cCAPTCHA\u3092\u89e3\u304f\u3053\u3068\u3082\u53ef\u80fd\u306b\u3059\u308b\u3002<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Examples_of_Adversarial_AI_Attacks\"><\/span>\u6575\u5bfe\u7684AI\u653b\u6483\u306e\u4f8b<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u6575\u5bfe\u7684AI\u306e\u4f8b\u3092\u4f7f\u3048\u3070\u3001\u30cf\u30c3\u30ab\u30fc\u306f\u5358\u7d14\u306bAI\u30e2\u30c7\u30eb\u306b\u30df\u30b9\u3092\u3055\u305b\u308b\u653b\u6483\u3092\u8a2d\u8a08\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002\u4f8b\u3048\u3070\u3001\u6709\u52b9\u306a\u30e2\u30c7\u30eb\u5165\u529b\u306e\u7834\u640d\u30d0\u30fc\u30b8\u30e7\u30f3\u306a\u3069\u3060\u3002<\/p>\n<p>\u3053\u3053\u3067\u306f\u3001\u6575\u5bfe\u7684AI\u653b\u6483\u3067\u4f7f\u7528\u3055\u308c\u308b\u624b\u6cd5\u306e\u4e00\u822c\u7684\u306a\u4f8b\u3092\u3044\u304f\u3064\u304b\u7d39\u4ecb\u3059\u308b\uff1a<br \/>\n<strong>FastGradient Sign\u6cd5\uff08FGSM\uff09\uff1a<\/strong> \u3053\u308c\u306f\u52fe\u914d\u306b\u57fa\u3065\u304f\u624b\u6cd5\u3067\u3001\u753b\u50cf\u306e\u8aa4\u5206\u985e\u3092\u5f15\u304d\u8d77\u3053\u3059\u305f\u3081\u306b\u9006\u8aac\u7684\u306aAI\u4f8b\u3092\u751f\u6210\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002\u3053\u308c\u306f\u3001\u753b\u50cf\u30d4\u30af\u30bb\u30eb\u306b\u6700\u5c0f\u9650\u306e\u6442\u52d5\u3092\u52a0\u3048\u308b\u3053\u3068\u306b\u3088\u3063\u3066\u884c\u308f\u308c\u308b\u3002<\/p>\n<p><strong>\u30ea\u30df\u30c6\u30c3\u30c9\u30fb\u30e1\u30e2\u30ea\u30fc\u30fb\u30d6\u30ed\u30a4\u30c7\u30f3\u30fb\u30d5\u30ec\u30c3\u30c1\u30e3\u30fc\u30fb\u30b4\u30fc\u30eb\u30c9\u30d5\u30a1\u30fc\u30d6\u30fb\u30b7\u30e3\u30f3\u30ce\uff08L-BFGS\uff09\uff1a<\/strong> \u3053\u306e\u624b\u6cd5\u3082\u975e\u7dda\u5f62\u52fe\u914d\u30d9\u30fc\u30b9\u306e\u6570\u5024\u6700\u9069\u5316\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3067\u3042\u308a\u3001\u753b\u50cf\u6442\u52d5\u306e\u56de\u6570\u3092\u6700\u5c0f\u5316\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002\u3053\u306e\u65b9\u6cd5\u306f\u3001\u9006\u5883\u7684AI\u4f8b\u3092\u751f\u6210\u3059\u308b\u306e\u306b\u975e\u5e38\u306b\u52b9\u679c\u7684\u3067\u3042\u308b\u3002<\/p>\n<p><strong>\u30c7\u30a3\u30fc\u30d7\u30d5\u30fc\u30eb\u306e\u653b\u6483<\/strong> \u3053\u308c\u306f\u3001\u8aa4\u5206\u985e\u7387\u304c\u9ad8\u304f\u3001\u6442\u52d5\u304c\u5c11\u306a\u3044\u6575\u5bfe\u7684AI\u653b\u6483\u3092\u751f\u6210\u3059\u308b\u306e\u306b\u975e\u5e38\u306b\u52b9\u679c\u7684\u306a\u5225\u306e\u624b\u6cd5\u3067\u3042\u308b\u3002\u3053\u306e\u5f62\u5f0f\u306e\u653b\u6483\u306f\u3001\u5143\u306e\u30b5\u30f3\u30d7\u30eb\u3068\u6442\u52d5\u3055\u308c\u305f\u30b5\u30f3\u30d7\u30eb\u306e\u9593\u306e\u30e6\u30fc\u30af\u30ea\u30c3\u30c9\u8ddd\u96e2\u3092\u7e2e\u3081\u308b\u305f\u3081\u306b\u3001\u30bf\u30fc\u30b2\u30c3\u30c8\u5316\u3055\u308c\u3066\u3044\u306a\u3044\u6575\u5bfe\u7684\u30b5\u30f3\u30d7\u30eb\u751f\u6210\u6280\u8853\u3092\u4f7f\u7528\u3057\u307e\u3059\u3002<\/p>\n<p><strong>\u30e4\u30b3\u30d3\u30a2\u30f3\u306b\u57fa\u3065\u304f\u9855\u8457\u6027\u30de\u30c3\u30d7\u653b\u6483\uff08JSMA\uff09\uff1a<\/strong> \u3053\u306e\u7a2e\u306e\u6575\u5bfe\u7684AI\u653b\u6483\u3067\u306f\u3001\u30cf\u30c3\u30ab\u30fc\u306f\u4fee\u6b63\u3055\u308c\u305f\u7279\u5fb4\u306e\u6570\u3092\u6700\u5c0f\u5316\u3059\u308b\u305f\u3081\u306b\u7279\u5fb4\u9078\u629e\u3092\u4f7f\u7528\u3057\u3001\u8aa4\u5206\u985e\u3092\u5f15\u304d\u8d77\u3053\u3059\u3002\u5e73\u5766\u306a\u6442\u52d5\u306f\u3001\u9855\u8457\u6027\u306e\u5024\u306b\u57fa\u3065\u3044\u3066\u3001\u5c0f\u3055\u3044\u9806\u306b\u7279\u5fb4\u306b\u7e70\u308a\u8fd4\u3057\u8ffd\u52a0\u3055\u308c\u308b\u3002<\/p>\n<p>\u3053\u308c\u3089\u306f\u9006\u5883\u7684AI\u306e\u307b\u3093\u306e\u4e00\u4f8b\u306b\u904e\u304e\u306a\u3044\u3002\u6b21\u306b\u3001\u9006\u5883\u7684AI\u306e\u653b\u6483\u306b\u5bfe\u3059\u308b\u9632\u5fa1\u65b9\u6cd5\u306b\u3064\u3044\u3066\u8aac\u660e\u3057\u3088\u3046\u3002<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_defend_against_Adversarial_AI_attacks\"><\/span>\u6575\u5bfe\u7684AI\u653b\u6483\u304b\u3089\u8eab\u3092\u5b88\u308b\u306b\u306f<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><div id=\"attachment_6027\" style=\"width: 2491px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-6027\" title=\"221122 \u30b9\u30ad\u30e0AI\u30a4\u30f3\u30d5\u30a9\u30b0\u30e9\u30d5\u30a3\u30c3\u30af2 png 01\"  src=\"http:\/\/skimai.com\/wp-content\/uploads\/2023\/07\/221122-skim-ai-infographic-2-png-01.png\" alt=\"221122 \u30b9\u30ad\u30e0AI\u30a4\u30f3\u30d5\u30a9\u30b0\u30e9\u30d5\u30a3\u30c3\u30af2 png 01\" width=\"2481\" height=\"7914\" \/><p id=\"caption-attachment-6027\" class=\"wp-caption-text\">221122 \u30b9\u30ad\u30e0AI\u30a4\u30f3\u30d5\u30a9\u30b0\u30e9\u30d5\u30a3\u30c3\u30af2 png 01<\/p><\/div><br \/>\n\u6575\u5bfe\u7684AI\u653b\u6483\u3092\u9632\u5fa1\u3059\u308b\u305f\u3081\u306b\u3001\u7d44\u7e54\u306fML\u7ba1\u7406\u3078\u306e\u5305\u62ec\u7684\u306a\u30a2\u30d7\u30ed\u30fc\u30c1\u304c\u5fc5\u8981\u3067\u3042\u308b\u3002\u3053\u308c\u306b\u306f\u3001ML\u306b\u95a2\u9023\u3059\u308b\u3059\u3079\u3066\u306e\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u5f37\u5316\u3057\u3001ML\u9632\u5fa1\u306b\u304a\u3051\u308b\u3042\u3089\u3086\u308b\u9055\u53cd\u3092\u5e38\u306b\u76e3\u8996\u3059\u308b\u3053\u3068\u304c\u542b\u307e\u308c\u308b\u3002<\/p>\n<p>\u6575\u5bfe\u7684AI\u653b\u6483\u306b\u5bfe\u3059\u308b\u5178\u578b\u7684\u306a\u9632\u5fa1\u6226\u7565\u306f\u3001\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u3082\u306e\u3060\uff1a<br \/>\n\u3059\u3079\u3066\u306eML\u5c0e\u5165\u306b\u5bfe\u3057\u3066\u65e2\u5b58\u306e\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u3092\u4f5c\u6210\u3059\u308b\u3002<br \/>\n\u3059\u3079\u3066\u306eML\u95a2\u9023\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u9069\u5207\u306a\u6240\u6709\u6a29\u3092\u5272\u308a\u5f53\u3066\u3001\u904b\u55b6\u4e0a\u306e\u30ac\u30d0\u30ca\u30f3\u30b9\u3092\u884c\u3046\u3002<br \/>\n\u6575\u5bfe\u7684AI\u653b\u6483\u3092\u9632\u5fa1\u3059\u308b\u305f\u3081\u306e\u65b0\u3057\u3044\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306e\u4f5c\u6210\u3002<\/p>\n<p>\u52b9\u679c\u7684\u306a\u9632\u5fa1\u30a2\u30d7\u30ed\u30fc\u30c1\u306e\u4e2d\u3067\u3001MLOps\u306fML\u30e2\u30c7\u30eb\u306e\u8a2d\u8a08\u3001\u958b\u767a\u3001\u904b\u7528\u3001\u305d\u3057\u3066\u30e2\u30c7\u30eb\u306e\u30c6\u30b9\u30c8\u3068\u691c\u8a3c\u306b\u5229\u7528\u3055\u308c\u3066\u3044\u308b\u3002MLOps\u306f\u3001\u6a5f\u68b0\u5b66\u7fd2\u3001DevOps\u3001\u30c7\u30fc\u30bf\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u306e\u9577\u6240\u3092\u7d71\u5408\u3057\u305f\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306e\u30bb\u30c3\u30c8\u3067\u3042\u308b\u3002\u4ee5\u4e0b\u306e\u8981\u7d20\u304b\u3089\u306a\u308b\u53cd\u5fa9\u7684\u304b\u3064\u6f38\u9032\u7684\u306a\u30d7\u30ed\u30bb\u30b9\u3092\u5b9f\u88c5\u3057\u3066\u3044\u308b\uff1a<br \/>\n<strong>\u30c7\u30b6\u30a4\u30f3\uff1a<\/strong><br \/>\n\u8981\u6c42\u5de5\u5b66<br \/>\nML\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u306e\u512a\u5148\u9806\u4f4d\u4ed8\u3051<br \/>\n\u30c7\u30fc\u30bf\u306e\u53ef\u7528\u6027\u3092\u30c1\u30a7\u30c3\u30af\u3059\u308b<br \/>\n<strong>\u30e2\u30c7\u30eb\u958b\u767a\uff1a<\/strong><br \/>\n\u30c7\u30fc\u30bf\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0<br \/>\nML\u30e2\u30c7\u30eb\u5de5\u5b66<br \/>\n\u30e2\u30c7\u30eb\u306e\u30c6\u30b9\u30c8\u3068\u691c\u8a3c<br \/>\n<strong>\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3<\/strong><br \/>\nML\u30e2\u30c7\u30eb\u306e\u5c55\u958b<br \/>\nCI\/CD\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u958b\u767a<br \/>\n\u904b\u7528\u76e3\u8996\u3068\u30c8\u30ea\u30ac\u30fc<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>\u7d50\u8ad6<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u30a2\u30e1\u30ea\u30ab\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u59d4\u54e1\u4f1a\u306b\u3088\u308b\u3068 <a href=\"https:\/\/science.house.gov\/imo\/media\/doc\/Schmidt%20Testimony%20Attachment.pdf\">\u30ec\u30dd\u30fc\u30c8<\/a> \u4eba\u5de5\u77e5\u80fd\u306b\u95a2\u3059\u308b\u7814\u7a76\u8cc7\u91d1\u306e\u3046\u3061\u3001AI\u30b7\u30b9\u30c6\u30e0\u3092\u6575\u5bfe\u7684\u653b\u6483\u304b\u3089\u5b88\u308b\u305f\u3081\u306b\u6295\u8cc7\u3055\u308c\u3066\u3044\u308b\u5272\u5408\u306f\u4f4e\u3044\u3002AI\u3084\u6a5f\u68b0\u5b66\u7fd2\u6280\u8853\u306e\u63a1\u7528\u304c\u9032\u3080\u306b\u3064\u308c\u3066\u3001\u6575\u5bfe\u7684\u306aAI\u653b\u6483\u304c\u5897\u52a0\u3057\u3066\u3044\u308b\u3002\u4e8b\u5b9f\u4e0a\u3001AI\u3068ML\u30b7\u30b9\u30c6\u30e0\u306f\u65b0\u305f\u306a\u653b\u6483\u5bfe\u8c61\u3068\u306a\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30ea\u30b9\u30af\u3092\u5897\u5927\u3055\u305b\u3066\u3044\u308b\u3002<\/p>","protected":false},"excerpt":{"rendered":"<p>What is an Adversarial AI Attack? Deep learning technologies like Artificial Intelligence (AI) and machine learning (ML) present a range of business benefits to enterprises. At the same time, an adversarial AI attack is a growing security challenge for modern systems. What is an Adversarial AI attack? A form of cyberattack that \u201cfools\u201d AI models with deceptive data. Also known as Adversarial ML, this form of attack has largely been reported in image classification and spam detection. Next, let\u2019s discuss the various risks posed by an Adversarial AI attack. Risks posed by an Adversarial AI attack According to Alexey Rubtsov of the Global Risk Institute, \u201cadversarial machine learning exploits vulnerabilities [&hellip;]<\/p>\n","protected":false},"author":1003,"featured_media":4817,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-custom-post-template.php","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[125],"tags":[],"class_list":["post-4816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enterprise-ai-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is an Adversarial AI Attack? - Skim AI<\/title>\n<meta name=\"description\" content=\"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skimai.com\/ja\/\u30d6\u30ed\u30b0-\u6575\u5bfe\u7684ai\u653b\u6483\u3068\u306f\u4f55\u304b\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an Adversarial AI Attack? - Skim AI\" \/>\n<meta property=\"og:description\" content=\"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skimai.com\/ja\/\u30d6\u30ed\u30b0-\u6575\u5bfe\u7684ai\u653b\u6483\u3068\u306f\u4f55\u304b\/\" \/>\n<meta property=\"og:site_name\" content=\"Skim AI\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-02T00:24:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T22:27:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Greggory Elias\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Greggory Elias\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\"},\"author\":{\"name\":\"Greggory Elias\",\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6\"},\"headline\":\"What is an Adversarial AI Attack?\",\"datePublished\":\"2022-12-02T00:24:31+00:00\",\"dateModified\":\"2024-04-29T22:27:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\"},\"wordCount\":741,\"publisher\":{\"@id\":\"https:\/\/skimai.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"articleSection\":[\"Enterprise AI\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\",\"url\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\",\"name\":\"What is an Adversarial AI Attack? - Skim AI\",\"isPartOf\":{\"@id\":\"https:\/\/skimai.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"datePublished\":\"2022-12-02T00:24:31+00:00\",\"dateModified\":\"2024-04-29T22:27:40+00:00\",\"description\":\"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?\",\"breadcrumb\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\",\"url\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"contentUrl\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"width\":960,\"height\":640,\"caption\":\"cover7\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/skimai.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an Adversarial AI Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/skimai.com\/uk\/#website\",\"url\":\"https:\/\/skimai.com\/uk\/\",\"name\":\"Skim AI\",\"description\":\"The AI Agent Workforce Platform\",\"publisher\":{\"@id\":\"https:\/\/skimai.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/skimai.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/skimai.com\/uk\/#organization\",\"name\":\"Skim AI\",\"url\":\"https:\/\/skimai.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png\",\"contentUrl\":\"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png\",\"width\":194,\"height\":58,\"caption\":\"Skim AI\"},\"image\":{\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/skim-ai\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6\",\"name\":\"Greggory Elias\",\"url\":\"https:\/\/skimai.com\/ja\/author\/gregg\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f- \u30b9\u30ad\u30e0AI","description":"\u6575\u5bfe\u7684\u306a\u653b\u6483\u306f\u30d3\u30b8\u30cd\u30b9\u306b\u3068\u3063\u3066\u975e\u5e38\u306b\u81f4\u547d\u7684\u3067\u3042\u308b\u3002\u7d76\u5bfe\u306b\u907f\u3051\u3088\u3046\u3002\u7d9a\u304d\u3092\u8aad\u3080\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skimai.com\/ja\/\u30d6\u30ed\u30b0-\u6575\u5bfe\u7684ai\u653b\u6483\u3068\u306f\u4f55\u304b\/","og_locale":"ja_JP","og_type":"article","og_title":"What is an Adversarial AI Attack? - Skim AI","og_description":"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?","og_url":"https:\/\/skimai.com\/ja\/\u30d6\u30ed\u30b0-\u6575\u5bfe\u7684ai\u653b\u6483\u3068\u306f\u4f55\u304b\/","og_site_name":"Skim AI","article_published_time":"2022-12-02T00:24:31+00:00","article_modified_time":"2024-04-29T22:27:40+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","type":"image\/jpeg"}],"author":"Greggory Elias","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"Greggory Elias","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#article","isPartOf":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/"},"author":{"name":"Greggory Elias","@id":"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6"},"headline":"What is an Adversarial AI Attack?","datePublished":"2022-12-02T00:24:31+00:00","dateModified":"2024-04-29T22:27:40+00:00","mainEntityOfPage":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/"},"wordCount":741,"publisher":{"@id":"https:\/\/skimai.com\/uk\/#organization"},"image":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","articleSection":["Enterprise AI"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/","url":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/","name":"\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f- \u30b9\u30ad\u30e0AI","isPartOf":{"@id":"https:\/\/skimai.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage"},"image":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","datePublished":"2022-12-02T00:24:31+00:00","dateModified":"2024-04-29T22:27:40+00:00","description":"\u6575\u5bfe\u7684\u306a\u653b\u6483\u306f\u30d3\u30b8\u30cd\u30b9\u306b\u3068\u3063\u3066\u975e\u5e38\u306b\u81f4\u547d\u7684\u3067\u3042\u308b\u3002\u7d76\u5bfe\u306b\u907f\u3051\u3088\u3046\u3002\u7d9a\u304d\u3092\u8aad\u3080\u6575\u5bfe\u7684AI\u653b\u6483\u3068\u306f\u4f55\u304b\uff1f","breadcrumb":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage","url":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","contentUrl":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","width":960,"height":640,"caption":"cover7"},{"@type":"BreadcrumbList","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/skimai.com\/"},{"@type":"ListItem","position":2,"name":"What is an Adversarial AI Attack?"}]},{"@type":"WebSite","@id":"https:\/\/skimai.com\/uk\/#website","url":"https:\/\/skimai.com\/uk\/","name":"\u30b9\u30ad\u30e0AI","description":"AI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u30fb\u30ef\u30fc\u30af\u30d5\u30a9\u30fc\u30b9\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0","publisher":{"@id":"https:\/\/skimai.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skimai.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/skimai.com\/uk\/#organization","name":"\u30b9\u30ad\u30e0AI","url":"https:\/\/skimai.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/","url":"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png","contentUrl":"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png","width":194,"height":58,"caption":"Skim AI"},"image":{"@id":"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/skim-ai"]},{"@type":"Person","@id":"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6","name":"\u30b0\u30ec\u30b4\u30ea\u30fc\u30fb\u30a8\u30ea\u30a2\u30b9","url":"https:\/\/skimai.com\/ja\/author\/gregg\/"}]}},"_links":{"self":[{"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/posts\/4816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/users\/1003"}],"replies":[{"embeddable":true,"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/comments?post=4816"}],"version-history":[{"count":0,"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/posts\/4816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/media\/4817"}],"wp:attachment":[{"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/media?parent=4816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/categories?post=4816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skimai.com\/ja\/wp-json\/wp\/v2\/tags?post=4816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}