• Title/Summary/Keyword: Proactive Artificial Intelligence

Search Result 13, Processing Time 0.019 seconds

AI Security Vulnerabilities in Fully Unmanned Stores: Adversarial Patch Attacks on Object Detection Model & Analysis of the Defense Effectiveness of Data Augmentation (완전 무인 매장의 AI 보안 취약점: 객체 검출 모델에 대한 Adversarial Patch 공격 및 Data Augmentation의 방어 효과성 분석)

  • Won-ho Lee;Hyun-sik Na;So-hee Park;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.245-261
    • /
    • 2024
  • The COVID-19 pandemic has led to the widespread adoption of contactless transactions, resulting in a noticeable increase in the trend towards fully unmanned stores. In such stores, all operational processes are automated, primarily using artificial intelligence (AI) technology. However, this AI technology has several security vulnerabilities, which can be critical in the environment of fully unmanned stores. This paper analyzes the security vulnerabilities that AI-based fully unmanned stores may face, focusing particularly on the object detection model YOLO, demonstrating that Hiding Attacks and Altering Attacks using adversarial patches are possible. It is confirmed that objects with adversarial patches attached may not be recognized by the detection model or may be incorrectly recognized as other objects. Furthermore, the paper analyzes how Data Augmentation techniques can mitigate security threats by providing a defensive effect against adversarial patch attacks. Based on these results, we emphasize the need for proactive research into defensive measures to address the inherent security threats in AI technology used in fully unmanned stores.

Christian Education for Human Spirit Transformation (인간 영의 변형을 위한 기독교교육)

  • Woo, Ji Yeon
    • Journal of Christian Education in Korea
    • /
    • v.66
    • /
    • pp.413-437
    • /
    • 2021
  • Humans are created as spiritual beings that can relate to God. However, when a human spirit refuses to transform through confronting God, it experiences a crisis. A spiritual crisis results from disconnecting with God, who is the ultimate foundation, but we humans try to overcome such absence through accomplishments and efforts. In this technological age, the ethics issues of AI (Artificial Intelligence), robots, and cloning are related to anthropology. The development of the mind, heart, and logic cannot suggest a basis for destruction and confusion as much as the development of the world. In fact, education focused on the human mind cannot be considered holistic. Mind, together with thought, will, and belief, plays a crucial role in making choices and leading a human life. So it is actively studied in other domains other than Christian education. However, although the human spirit takes care of some territory of humanity, unlike the mind, it can neither be partial nor fragmentary. Instead, it manages the transformation that influences the core of human life. Therefore, Christian education must clearly concentrate on the spirit rather than on other human elements, intentionally concerning spiritual transformation through encounters with God. In other words, Christian education is the passage connecting a human spirit to God's presence at work, which enables us to understand the human being as a whole. For this, we must put our efforts to increase the chances of encountering God through Christian education. While "Encounter" requires both parties' interaction, "Transformation" stresses God as the main agent and His proactive nature. I also want to emphasize "worship" as the opportunity to communicate and experience God in our daily lives. By examining the preparation and the process of the spiritual transformation of humans, this paper would offer a theological foundation for continued transformation of the human spirit in the faith community, rather than personal experience or conviction.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.