{"id":4816,"date":"2022-12-01T19:24:31","date_gmt":"2022-12-02T00:24:31","guid":{"rendered":"http:\/\/skimai.com\/?p=4816"},"modified":"2024-04-29T17:27:40","modified_gmt":"2024-04-29T22:27:40","slug":"%eb%b8%94%eb%a1%9c%ea%b7%b8-%ec%a0%81%eb%8c%80%ec%a0%81-ai-%ea%b3%b5%ea%b2%a9%ec%9d%b4%eb%9e%80-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80%ec%9a%94","status":"publish","type":"post","link":"https:\/\/skimai.com\/ko\/blog-what-is-an-adversarial-ai-attack\/","title":{"rendered":"\uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\ubaa9\ucc28<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\ubaa9\ucc28 \ud1a0\uae00\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">\ud1a0\uae00<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/skimai.com\/ko\/blog-what-is-an-adversarial-ai-attack\/#What_is_an_Adversarial_AI_Attack\" >\uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/skimai.com\/ko\/blog-what-is-an-adversarial-ai-attack\/#Risks_posed_by_an_Adversarial_AI_attack\" >\uc801\ub300\uc801 AI \uacf5\uaca9\uc73c\ub85c \uc778\ud55c \ub9ac\uc2a4\ud06c<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/skimai.com\/ko\/blog-what-is-an-adversarial-ai-attack\/#Examples_of_Adversarial_AI_Attacks\" >\uc801\ub300\uc801 AI \uacf5\uaca9\uc758 \uc608\uc2dc<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/skimai.com\/ko\/blog-what-is-an-adversarial-ai-attack\/#How_to_defend_against_Adversarial_AI_attacks\" >\uc801\ub300\uc801 AI \uacf5\uaca9\uc744 \ubc29\uc5b4\ud558\ub294 \ubc29\ubc95<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/skimai.com\/ko\/blog-what-is-an-adversarial-ai-attack\/#Conclusion\" >\uacb0\ub860<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1><span class=\"ez-toc-section\" id=\"What_is_an_Adversarial_AI_Attack\"><\/span>\uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>\uc778\uacf5\uc9c0\ub2a5(AI) \ubc0f \uba38\uc2e0\ub7ec\ub2dd(ML)\uacfc \uac19\uc740 \ub525\ub7ec\ub2dd \uae30\uc220\uc740 \uae30\uc5c5\uc5d0\uac8c \ub2e4\uc591\ud55c \ube44\uc988\ub2c8\uc2a4 \uc774\uc810\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \ub3d9\uc2dc\uc5d0 \uc801\ub300\uc801\uc778 AI \uacf5\uaca9\uc740 \ucd5c\uc2e0 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc810\uc810 \ub354 \ud070 \ubcf4\uc548 \uacfc\uc81c\uac00 \ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.<br \/>\n\uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? \uae30\ub9cc\uc801\uc778 \ub370\uc774\ud130\ub85c AI \ubaa8\ub378\uc744 '\uc18d\uc774\ub294' \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \ud55c \ud615\ud0dc\uc785\ub2c8\ub2e4. \uc801\ub300\uc801 ML\uc774\ub77c\uace0\ub3c4 \ud558\ub294 \uc774\ub7ec\ud55c \ud615\ud0dc\uc758 \uacf5\uaca9\uc740 \uc8fc\ub85c \uc774\ubbf8\uc9c0 \ubd84\ub958 \ubc0f \uc2a4\ud338 \ud0d0\uc9c0 \ubd84\uc57c\uc5d0\uc11c \ubcf4\uace0\ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.<br \/>\n\ub2e4\uc74c\uc73c\ub85c, \uc801\ub300\uc801 AI \uacf5\uaca9\uc73c\ub85c \uc778\ud55c \ub2e4\uc591\ud55c \uc704\ud5d8\uc5d0 \ub300\ud574 \ub17c\uc758\ud574 \ubcf4\uaca0\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risks_posed_by_an_Adversarial_AI_attack\"><\/span>\uc801\ub300\uc801 AI \uacf5\uaca9\uc73c\ub85c \uc778\ud55c \ub9ac\uc2a4\ud06c<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\uc5d0 \ub530\ub974\uba74 <a href=\"https:\/\/www.csoonline.com\/article\/3664748\/adversarial-machine-learning-explained-how-attackers-disrupt-ai-and-ml-systems.html\">\uc54c\ub809\uc138\uc774 \ub8e8\ube0c\uc18c\ud504<\/a> \ub294 \"\uc801\ub300\uc801 \uba38\uc2e0\ub7ec\ub2dd\uc740 ML \ubaa8\ub378\uc758 \ucde8\uc57d\uc810\uacfc \ud2b9\uc218\uc131\uc744 \uc545\uc6a9\ud55c\ub2e4\"\uace0 \uc124\uba85\ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \uc801\ub300\uc801 ML\uc740 ML \uae30\ubc18 \ud2b8\ub808\uc774\ub529 \uc54c\uace0\ub9ac\uc998\uc774 \ud2b8\ub808\uc774\ub529\uc5d0 \ub300\ud574 \uc798\ubabb\ub41c \uacb0\uc815\uc744 \ub0b4\ub9ac\ub3c4\ub85d \ub9cc\ub4e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc801\ub300\uc801 AI \uacf5\uaca9\uc740 AI\uc640 ML \uc2dc\uc2a4\ud15c\uc5d0 \uc5b4\ub5bb\uac8c \uc704\ud5d8\uc744 \ucd08\ub798\ud560\uae4c\uc694? \ub2e4\uc74c\uc740 \uba87 \uac00\uc9c0 \uc77c\ubc18\uc801\uc778 \uacb0\uacfc\uc785\ub2c8\ub2e4:<br \/>\n<strong>\uc18c\uc15c \ubbf8\ub514\uc5b4 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1:<\/strong> \uc774 \uacbd\uc6b0 AI \uacf5\uaca9\uc740 \uc790\ub3d9\ud654\ub97c \ud1b5\ud574 \uc18c\uc15c \ubbf8\ub514\uc5b4 \ud50c\ub7ab\ud3fc\uc758 \uc0ac\uc6a9\uc790 \ud504\ub85c\ud544\uc744 '\uc2a4\ud06c\ub7a9'\ud569\ub2c8\ub2e4. \uadf8\ub7f0 \ub2e4\uc74c \uc758\ub3c4\ud55c \ud504\ub85c\ud544\uc744 '\uc720\uc778'\ud558\uae30 \uc704\ud574 \uc790\ub3d9\uc73c\ub85c \ucf58\ud150\uce20\ub97c \uc0dd\uc131\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>\ub525\ud398\uc774\ud06c:<\/strong> \uc77c\ubc18\uc801\uc73c\ub85c \uc740\ud589 \uc0ac\uae30\uc5d0 \uc0ac\uc6a9\ub418\ub294 \ub525\ud398\uc774\ud06c\ub294 \ub2e4\uc74c\uacfc \uac19\uc740 \ub2e4\uc591\ud55c \uc545\uc758\uc801\uc778 \ubaa9\uc801\uc744 \ub2ec\uc131\ud560 \uc218 \uc788\ub294 \uc628\ub77c\uc778 \uc704\ud611 \ud589\uc704\uc790\uc785\ub2c8\ub2e4:<br \/>\n\ud611\ubc15 \ubc0f \uac08\ucde8<br \/>\n\uac1c\uc778\uc758 \uc2e0\ub8b0\ub3c4 \ubc0f \uc774\ubbf8\uc9c0 \uc190\uc0c1<br \/>\n\ubb38\uc11c \uc0ac\uae30<br \/>\n\uac1c\uc778 \ub610\ub294 \uc9d1\ub2e8 \uad34\ub86d\ud798\uc744 \uc704\ud55c \uc18c\uc15c \ubbf8\ub514\uc5b4<\/p>\n<p><strong>\uba40\uc6e8\uc5b4 \uc228\uae30\uae30:<\/strong> \uc5ec\uae30\uc11c \uc704\ud611 \ud589\uc704\uc790\ub294 ML\uc744 \ud65c\uc6a9\ud558\uc5ec \uc77c\ubc18 \uc0ac\uc6a9\uc790\uc5d0\uac8c\ub294 \uc815\uc0c1\uc801\uc73c\ub85c \ubcf4\uc774\ub294 '\uc545\uc131' \ud2b8\ub798\ud53d \ub0b4\uc5d0 \uba40\uc6e8\uc5b4\ub97c \uc228\uae41\ub2c8\ub2e4.<\/p>\n<p><strong>\ube44\ubc00\ubc88\ud638:<\/strong> \uc801\ub300\uc801\uc778 AI \uacf5\uaca9\uc740 \ub300\ub7c9\uc758 \ube44\ubc00\ubc88\ud638\ub97c \ubd84\uc11d\ud558\uace0 \ubcc0\ud615\uc744 \uc0dd\uc131\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \uc989, \uc774\ub7ec\ud55c \uacf5\uaca9\uc740 \ube44\ubc00\ubc88\ud638\ub97c \ud574\ub3c5\ud558\ub294 \uacfc\uc815\uc744 \ub354\uc6b1 '\uacfc\ud559\uc801'\uc73c\ub85c \ub9cc\ub4ed\ub2c8\ub2e4. \ube44\ubc00\ubc88\ud638 \uc678\uc5d0\ub3c4 \uc704\ud611 \ud589\uc704\uc790\ub294 \uba38\uc2e0\ub7ec\ub2dd\uc744 \ud1b5\ud574 \ubcf4\uc548 \ubb38\uc790\ub97c \ud574\uacb0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Examples_of_Adversarial_AI_Attacks\"><\/span>\uc801\ub300\uc801 AI \uacf5\uaca9\uc758 \uc608\uc2dc<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\ud574\ucee4\ub294 \uc801\ub300\uc801 AI \uc608\uc81c\ub97c \uc0ac\uc6a9\ud558\uc5ec AI \ubaa8\ub378\uc774 \uc2e4\uc218\ub97c \ud558\ub3c4\ub85d \uacf5\uaca9\uc744 \uc124\uacc4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \uc720\ud6a8\ud55c \ubaa8\ub378 \uc785\ub825\uc758 \uc190\uc0c1\ub41c \ubc84\uc804\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ub2e4\uc74c\uc740 \uc801\ub300\uc801 AI \uacf5\uaca9\uc5d0 \uc0ac\uc6a9\ub418\ub294 \uba87 \uac00\uc9c0 \uc778\uae30 \uc788\ub294 \ubc29\ubc95\uc758 \uc608\uc2dc\uc785\ub2c8\ub2e4:<br \/>\n<strong>\uace0\uc18d \uadf8\ub77c\ub514\uc5b8\ud2b8 \uae30\ud638 \ubc29\ubc95(FGSM):<\/strong> \uc774\ub294 \uc774\ubbf8\uc9c0\uc758 \uc624 \ubd84\ub958\ub97c \uc720\ubc1c\ud558\ub294 \uc801\ub300\uc801 AI \uc608\uc81c\ub97c \uc0dd\uc131\ud560 \uc218 \uc788\ub294 \uadf8\ub77c\ub370\uc774\uc158 \uae30\ubc18 \ubc29\uc2dd\uc785\ub2c8\ub2e4. \uc774\ubbf8\uc9c0 \ud53d\uc140\uc5d0 \ucd5c\uc18c\ud55c\uc758 \uc12d\ub3d9\uc744 \ucd94\uac00\ud558\uc5ec \uc774\ub97c \uc218\ud589\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>\uc81c\ud55c \uba54\ubaa8\ub9ac \ube0c\ub85c\uc774\ub4e0-\ud50c\ub808\ucc98-\uace8\ub4dc\ud30c\ube0c-\uc0e4\ub178(L-BFGS):<\/strong> \uc774 \ubc29\ubc95\uc740 \uc774\ubbf8\uc9c0 \uc12d\ub3d9\uc758 \uc218\ub97c \ucd5c\uc18c\ud654\ud560 \uc218 \uc788\ub294 \ub610 \ub2e4\ub978 \ube44\uc120\ud615 \uadf8\ub77c\ub370\uc774\uc158 \uae30\ubc18 \uc218\uce58 \ucd5c\uc801\ud654 \uc54c\uace0\ub9ac\uc998\uc785\ub2c8\ub2e4. \uc774 \ubc29\ubc95\uc740 \uc801\ub300\uc801 AI \uc608\uc81c\ub97c \uc0dd\uc131\ud558\ub294 \ub370 \ub9e4\uc6b0 \ud6a8\uacfc\uc801\uc785\ub2c8\ub2e4.<\/p>\n<p><strong>\ub525\ud480 \uacf5\uaca9:<\/strong> \uc774 \ubc29\ubc95\uc740 \uc624\ubd84\ub958\uc728\uc774 \ub192\uace0 \uad50\ub780\uc774 \uc801\uc740 \uc801\ub300\uc801 AI \uacf5\uaca9\uc744 \uc0dd\uc131\ud558\ub294 \ub370 \ub9e4\uc6b0 \ud6a8\uacfc\uc801\uc778 \ub610 \ub2e4\ub978 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uc774 \ud615\ud0dc\uc758 \uacf5\uaca9\uc740 \ud45c\uc801\uc774 \uc5c6\ub294 \uc801\ub300\uc801 \uc0d8\ud50c \uc0dd\uc131 \uae30\ubc95\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc6d0\ubcf8 \uc0d8\ud50c\uacfc \uad50\ub780\ub41c \uc0d8\ud50c \uc0ac\uc774\uc758 \uc720\ud074\ub9ac\ub4dc \uac70\ub9ac\ub97c \uc904\uc785\ub2c8\ub2e4.<\/p>\n<p><strong>\uc790\ucf54\ube44\uc548 \uae30\ubc18 \uc0b4\ub9ac\uc5b8\uc2a4 \ub9f5 \uacf5\uaca9(JSMA):<\/strong> \uc774\ub7ec\ud55c \ud615\ud0dc\uc758 \uc801\ub300\uc801 AI \uacf5\uaca9\uc5d0\uc11c \ud574\ucee4\ub294 \ud2b9\uc9d5 \uc120\ud0dd\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc218\uc815\ub41c \ud2b9\uc9d5\uc758 \uc218\ub97c \ucd5c\uc18c\ud654\ud568\uc73c\ub85c\uc368 \uc798\ubabb\ub41c \ubd84\ub958\ub97c \uc720\ubc1c\ud569\ub2c8\ub2e4. \ud3c9\ud3c9\ud55c \uc12d\ub3d9\uc740 \uc911\uc694\ub3c4 \uac12\uc5d0 \ub530\ub77c \ud2b9\uc9d5\uc5d0 \ubc18\ubcf5\uc801\uc73c\ub85c \ucd94\uac00\ub418\uc5b4 \uac10\uc18c\ud558\ub294 \uc21c\uc11c\uc5d0 \ub530\ub77c \ud2b9\uc9d5\uc5d0 \ucd94\uac00\ub429\ub2c8\ub2e4.<\/p>\n<p>\uc774\ub294 \uc801\ub300\uc801 AI\uc758 \uba87 \uac00\uc9c0 \uc608\uc2dc\uc77c \ubfd0\uc785\ub2c8\ub2e4. \ub2e4\uc74c\uc73c\ub85c \uc801\ub300\uc801 AI \uacf5\uaca9\uc744 \ubc29\uc5b4\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_defend_against_Adversarial_AI_attacks\"><\/span>\uc801\ub300\uc801 AI \uacf5\uaca9\uc744 \ubc29\uc5b4\ud558\ub294 \ubc29\ubc95<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><div id=\"attachment_6027\" style=\"width: 2491px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-6027\" title=\"221122 SKIM AI \uc778\ud3ec\uadf8\ub798\ud53d 2 PNG 01\"  src=\"http:\/\/skimai.com\/wp-content\/uploads\/2023\/07\/221122-skim-ai-infographic-2-png-01.png\" alt=\"221122 SKIM AI \uc778\ud3ec\uadf8\ub798\ud53d 2 PNG 01\" width=\"2481\" height=\"7914\" \/><p id=\"caption-attachment-6027\" class=\"wp-caption-text\">221122 SKIM AI \uc778\ud3ec\uadf8\ub798\ud53d 2 PNG 01<\/p><\/div><br \/>\n\uc801\ub300\uc801 AI \uacf5\uaca9\uc744 \ubc29\uc5b4\ud558\ub824\uba74 \uc870\uc9c1\uc740 ML \uad00\ub9ac\uc5d0 \ub300\ud55c \ud3ec\uad04\uc801\uc778 \uc811\uadfc \ubc29\uc2dd\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ubaa8\ub4e0 ML \uad00\ub828 \uc6b4\uc601\uc744 \uac15\ud654\ud558\uace0 ML \ubc29\uc5b4\uc758 \ubaa8\ub4e0 \uc704\ubc18 \uc0ac\ud56d\uc744 \uc9c0\uc18d\uc801\uc73c\ub85c \ubaa8\ub2c8\ud130\ub9c1\ud558\ub294 \uac83\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n<p>\uc801\ub300\uc801 AI \uacf5\uaca9\uc5d0 \ub300\ud55c \uc77c\ubc18\uc801\uc778 \ubc29\uc5b4 \uc804\ub7b5\uc740 \ub2e4\uc74c\uacfc \uac19\uc774 \uad6c\uc131\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4:<br \/>\n\ubaa8\ub4e0 ML \uad6c\ud604\uc5d0 \ub300\ud574 \uae30\uc874 \uc704\ud5d8 \ud3c9\uac00\ub97c \uc0dd\uc131\ud569\ub2c8\ub2e4.<br \/>\n\ubaa8\ub4e0 ML \uad00\ub828 \ucf58\ud150\uce20 \ubc0f \uc6b4\uc601 \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \uc801\uc808\ud55c \uc18c\uc720\uad8c\uc744 \ud560\ub2f9\ud569\ub2c8\ub2e4.<br \/>\n\uc801\ub300\uc801 AI \uacf5\uaca9\uc744 \ubc29\uc5b4\ud558\uae30 \uc704\ud55c \uc0c8\ub85c\uc6b4 \ubcf4\uc548 \uc815\ucc45 \ub9cc\ub4e4\uae30.<\/p>\n<p>\ud6a8\uacfc\uc801\uc778 \ubc29\uc5b4 \uc811\uadfc \ubc29\uc2dd \uc911 MLOps\ub294 \ubaa8\ub378 \ud14c\uc2a4\ud2b8 \ubc0f \uac80\uc99d\uacfc \ud568\uaed8 ML \ubaa8\ub378\uc744 \uc124\uacc4, \uac1c\ubc1c \ubc0f \uc6b4\uc601\ud558\ub294 \ub370 \uc0ac\uc6a9\ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4. MLOps\ub294 \uba38\uc2e0 \ub7ec\ub2dd, DevOps, \ub370\uc774\ud130 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1\uc758 \uc7a5\uc810\uc744 \ud1b5\ud569\ud55c \ubaa8\ubc94 \uc0ac\ub840 \uc9d1\ud569\uc785\ub2c8\ub2e4. \ub2e4\uc74c \uc694\uc18c\ub85c \uad6c\uc131\ub41c \ubc18\ubcf5\uc801\uc774\uace0 \uc810\uc9c4\uc801\uc778 \ud504\ub85c\uc138\uc2a4\ub97c \uad6c\ud604\ud569\ub2c8\ub2e4:<br \/>\n<strong>\ub514\uc790\uc778:<\/strong><br \/>\n\uc694\uad6c \uc0ac\ud56d \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1<br \/>\nML \uc0ac\uc6a9 \uc0ac\ub840\uc758 \uc6b0\uc120\uc21c\uc704 \uc9c0\uc815<br \/>\n\ub370\uc774\ud130 \uac00\uc6a9\uc131 \ud655\uc778<br \/>\n<strong>\ubaa8\ub378 \uac1c\ubc1c:<\/strong><br \/>\n\ub370\uc774\ud130 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1<br \/>\nML \ubaa8\ub378 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1<br \/>\n\ubaa8\ub378 \ud14c\uc2a4\ud2b8 \ubc0f \uc720\ud6a8\uc131 \uac80\uc0ac<br \/>\n<strong>\uc6b4\uc601:<\/strong><br \/>\nML \ubaa8\ub378 \ubc30\ud3ec<br \/>\nCI\/CD \ud30c\uc774\ud504\ub77c\uc778 \uac1c\ubc1c<br \/>\n\uc6b4\uc601 \ubaa8\ub2c8\ud130\ub9c1 \ubc0f \ud2b8\ub9ac\uac70\ub9c1<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>\uacb0\ub860<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\ubbf8\uad6d \uad6d\uac00\uc548\ubcf4\uc704\uc6d0\ud68c\uc5d0 \ub530\ub974\uba74 <a href=\"https:\/\/science.house.gov\/imo\/media\/doc\/Schmidt%20Testimony%20Attachment.pdf\">\ubcf4\uace0<\/a> \uc778\uacf5\uc9c0\ub2a5\uc5d0 \ub300\ud55c \uc5f0\uad6c \uc790\uae08 \uc911 \uc801\ub300\uc801 \uacf5\uaca9\uc73c\ub85c\ubd80\ud130 \uc778\uacf5\uc9c0\ub2a5 \uc2dc\uc2a4\ud15c\uc744 \ubc29\uc5b4\ud558\ub294 \ub370 \ud22c\uc790\ub418\ub294 \ube44\uc728\uc740 \ub0ae\uc2b5\ub2c8\ub2e4. AI \ubc0f \uba38\uc2e0\ub7ec\ub2dd \uae30\uc220\uc758 \ucc44\ud0dd\uc774 \uc99d\uac00\ud568\uc5d0 \ub530\ub77c \uc801\ub300\uc801 AI \uacf5\uaca9\ub3c4 \uc99d\uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc0ac\uc2e4\uc0c1 AI\uc640 \uba38\uc2e0\ub7ec\ub2dd \uc2dc\uc2a4\ud15c\uc740 \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \ud45c\uba74\uc744 \uc81c\uc2dc\ud558\uc5ec \ubcf4\uc548 \uad00\ub828 \uc704\ud5d8\uc744 \uc99d\uac00\uc2dc\ud0a4\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is an Adversarial AI Attack? Deep learning technologies like Artificial Intelligence (AI) and machine learning (ML) present a range of business benefits to enterprises. At the same time, an adversarial AI attack is a growing security challenge for modern systems. What is an Adversarial AI attack? A form of cyberattack that \u201cfools\u201d AI models [&hellip;]<\/p>\n","protected":false},"author":1003,"featured_media":4817,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-custom-post-template.php","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[125],"tags":[],"class_list":["post-4816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enterprise-ai-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is an Adversarial AI Attack? - Skim AI<\/title>\n<meta name=\"description\" content=\"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skimai.com\/ko\/\ube14\ub85c\uadf8-\uc801\ub300\uc801-ai-\uacf5\uaca9\uc774\ub780-\ubb34\uc5c7\uc778\uac00\uc694\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an Adversarial AI Attack? - Skim AI\" \/>\n<meta property=\"og:description\" content=\"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skimai.com\/ko\/\ube14\ub85c\uadf8-\uc801\ub300\uc801-ai-\uacf5\uaca9\uc774\ub780-\ubb34\uc5c7\uc778\uac00\uc694\/\" \/>\n<meta property=\"og:site_name\" content=\"Skim AI\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-02T00:24:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T22:27:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Greggory Elias\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"Greggory Elias\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\"},\"author\":{\"name\":\"Greggory Elias\",\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6\"},\"headline\":\"What is an Adversarial AI Attack?\",\"datePublished\":\"2022-12-02T00:24:31+00:00\",\"dateModified\":\"2024-04-29T22:27:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\"},\"wordCount\":741,\"publisher\":{\"@id\":\"https:\/\/skimai.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"articleSection\":[\"Enterprise AI\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\",\"url\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\",\"name\":\"What is an Adversarial AI Attack? - Skim AI\",\"isPartOf\":{\"@id\":\"https:\/\/skimai.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"datePublished\":\"2022-12-02T00:24:31+00:00\",\"dateModified\":\"2024-04-29T22:27:40+00:00\",\"description\":\"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?\",\"breadcrumb\":{\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage\",\"url\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"contentUrl\":\"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg\",\"width\":960,\"height\":640,\"caption\":\"cover7\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/skimai.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an Adversarial AI Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/skimai.com\/uk\/#website\",\"url\":\"https:\/\/skimai.com\/uk\/\",\"name\":\"Skim AI\",\"description\":\"The AI Agent Workforce Platform\",\"publisher\":{\"@id\":\"https:\/\/skimai.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/skimai.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/skimai.com\/uk\/#organization\",\"name\":\"Skim AI\",\"url\":\"https:\/\/skimai.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png\",\"contentUrl\":\"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png\",\"width\":194,\"height\":58,\"caption\":\"Skim AI\"},\"image\":{\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/skim-ai\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6\",\"name\":\"Greggory Elias\",\"url\":\"https:\/\/skimai.com\/ko\/author\/gregg\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? - \uc2a4\ud0a4\ubc0d AI","description":"\uc801\ub300\uc801 \uacf5\uaca9\uc740 \ube44\uc988\ub2c8\uc2a4\uc5d0 \ub9e4\uc6b0 \uce58\uba85\uc801\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc5b4\ub5a4 \ub300\uac00\ub97c \uce58\ub974\ub354\ub77c\ub3c4 \ud53c\ud574\uc57c \ud569\ub2c8\ub2e4. \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uc138\uc694: \uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skimai.com\/ko\/\ube14\ub85c\uadf8-\uc801\ub300\uc801-ai-\uacf5\uaca9\uc774\ub780-\ubb34\uc5c7\uc778\uac00\uc694\/","og_locale":"ko_KR","og_type":"article","og_title":"What is an Adversarial AI Attack? - Skim AI","og_description":"Adversarial attacks can be very deadly to a business. Avoid them at all costs. Read on to learn: What is an Adversarial AI Attack?","og_url":"https:\/\/skimai.com\/ko\/\ube14\ub85c\uadf8-\uc801\ub300\uc801-ai-\uacf5\uaca9\uc774\ub780-\ubb34\uc5c7\uc778\uac00\uc694\/","og_site_name":"Skim AI","article_published_time":"2022-12-02T00:24:31+00:00","article_modified_time":"2024-04-29T22:27:40+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","type":"image\/jpeg"}],"author":"Greggory Elias","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"Greggory Elias","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#article","isPartOf":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/"},"author":{"name":"Greggory Elias","@id":"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6"},"headline":"What is an Adversarial AI Attack?","datePublished":"2022-12-02T00:24:31+00:00","dateModified":"2024-04-29T22:27:40+00:00","mainEntityOfPage":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/"},"wordCount":741,"publisher":{"@id":"https:\/\/skimai.com\/uk\/#organization"},"image":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","articleSection":["Enterprise AI"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/","url":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/","name":"\uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694? - \uc2a4\ud0a4\ubc0d AI","isPartOf":{"@id":"https:\/\/skimai.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage"},"image":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","datePublished":"2022-12-02T00:24:31+00:00","dateModified":"2024-04-29T22:27:40+00:00","description":"\uc801\ub300\uc801 \uacf5\uaca9\uc740 \ube44\uc988\ub2c8\uc2a4\uc5d0 \ub9e4\uc6b0 \uce58\uba85\uc801\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc5b4\ub5a4 \ub300\uac00\ub97c \uce58\ub974\ub354\ub77c\ub3c4 \ud53c\ud574\uc57c \ud569\ub2c8\ub2e4. \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uc138\uc694: \uc801\ub300\uc801 AI \uacf5\uaca9\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?","breadcrumb":{"@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#primaryimage","url":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","contentUrl":"https:\/\/skimai.com\/wp-content\/uploads\/2022\/12\/cover7.jpg","width":960,"height":640,"caption":"cover7"},{"@type":"BreadcrumbList","@id":"https:\/\/skimai.com\/blog-what-is-an-adversarial-ai-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/skimai.com\/"},{"@type":"ListItem","position":2,"name":"What is an Adversarial AI Attack?"}]},{"@type":"WebSite","@id":"https:\/\/skimai.com\/uk\/#website","url":"https:\/\/skimai.com\/uk\/","name":"\uc2a4\ud0a4\ubc0d AI","description":"AI \uc0c1\ub2f4\uc6d0 \uc6cc\ud06c\ud3ec\uc2a4 \ud50c\ub7ab\ud3fc","publisher":{"@id":"https:\/\/skimai.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skimai.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/skimai.com\/uk\/#organization","name":"\uc2a4\ud0a4\ubc0d AI","url":"https:\/\/skimai.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/","url":"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png","contentUrl":"http:\/\/skimai.com\/wp-content\/uploads\/2020\/07\/SKIM-AI-Header-Logo.png","width":194,"height":58,"caption":"Skim AI"},"image":{"@id":"https:\/\/skimai.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/skim-ai"]},{"@type":"Person","@id":"https:\/\/skimai.com\/uk\/#\/schema\/person\/7a883b4a2d2ea22040f42a7975eb86c6","name":"\uadf8\ub808\uace0\ub9ac \uc5d8\ub9ac\uc544\uc2a4","url":"https:\/\/skimai.com\/ko\/author\/gregg\/"}]}},"_links":{"self":[{"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/posts\/4816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/users\/1003"}],"replies":[{"embeddable":true,"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/comments?post=4816"}],"version-history":[{"count":0,"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/posts\/4816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/media\/4817"}],"wp:attachment":[{"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/media?parent=4816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/categories?post=4816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skimai.com\/ko\/wp-json\/wp\/v2\/tags?post=4816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}