Robustness Evaluation of AI Security Monitoring Algorithms in Multi-Dimensional Data Flow Environments
Main Article Content
Abstract
Article Details
Section
How to Cite
References
1. O. Brown, A. Curtis, and J. Goodwin, “Principles for evaluation of ai/ml model performance and robustness,” arXiv preprint arXiv:2107.02868, 2021.
2. C. L. Cheong, “Research on AI Security Strategies and Practical Approaches for Risk Management”, J. Comput. Signal Syst. Res., vol. 2, no. 7, pp. 98–115, Dec. 2025, doi: 10.71222/17gqja14.
3. I. Zakariyya, H. Kalutarage, and M. O. Al-Kadri, “Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring,” Computers & Security, vol. 133, 103388, 2023.
4. N. Jehan et al., “Adversarial Machine Learning for Cyber security Defense: Detecting Model Evasion, Poisoning Attacks, and Enhancing the Robustness of AI Systems,” Global Research Journal of Natural Science and Technology, vol. 3, no. 2, 2025.
5. E. G. Lee et al., “A Study on Robustness Evaluation and Improvement of AI Model for Malware Variation Analysis,” Journal of the Korea Institute of Information Security & Cryptology, vol. 32, no. 5, pp. 997-1008, 2022.
6. W. Sun, “Integration of Market-Oriented Development Models and Marketing Strategies in Real Estate,” European Journal of Business, Economics & Management, vol. 1, no. 3, pp. 45–52, 2025.
7. A. Awadid and B. Robert, “On Assessing ML Model Robustness: A Methodological Framework,” in Symposium on Scaling AI Assessments, 2025.
8. J. Mahilraj et al., “Evaluation of the robustness, transparency, reliability and safety of AI systems,” in 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), 2023, vol. 1, pp. 2526-2535.
9. P. Roy, “Enhancing Real-World Robustness in AI: Challenges and Solutions,” J. Recent Trends Comput. Sci. Eng, vol. 12, no. 1, pp. 34-49, 2024.
10. S. Yuan, “Data Flow Mechanisms and Model Applications in Intelligent Business Operation Platforms”, Financial Economics Insights, vol. 2, no. 1, pp. 144–151, 2025, doi: 10.70088/m66tbm53.
11. H. Javed, S. El-Sappagh, and T. Abuhmed, “Robustness in deep learning models for medical diagnostics: security and adversarial challenges towards robust AI applications,” Artificial Intelligence Review, vol. 58, no. 1, 2024.
12. G. Ying, “Cloud computing and machine learning-driven security optimization and threat detection mechanisms for telecom operator networks,” Artificial Intelligence and Digital Technology, vol. 2, no. 1, pp. 98–114, 2025.
13. D. Namiot and E. Ilyushin, “On the robustness and security of Artificial Intelligence systems,” International Journal of Open Information Technologies, vol. 10, no. 9, pp. 126-134, 2022.
14. A. Agarwal and M. J. Nene, “Advancing trustworthy ai: A comparative evaluation of ai robustness toolboxes,” SN Computer Science, vol. 6, no. 3, 2025.
15. E. Binterová, “Safe and Secure High-Risk AI: Evaluation of Robustness,” 2023.
16. C. L. Chang et al., “Evaluating robustness of ai models against adversarial attacks,” in Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence, 2020, pp. 47-54.
17. X. Zhang, K. Li, Y. Dai, and S. Yi, “Modeling the land cover change in Chesapeake Bay area for precision conservation and green infrastructure planning,” Remote Sensing, vol. 16, no. 3, p. 545, 2024. https://doi.org/10.3390/rs16030545.
18. Y. Chen, H. Du, and Y. Zhou, “Lightweight network-based semantic segmentation for UAVs and its RISC-V implementation,” Journal of Technology Innovation and Engineering, vol. 1, no. 2, 2025.
19. B. Zhang, Z. Lin, and Y. Su, “Design and Implementation of Code Completion System Based on LLM and CodeBERT Hybrid Subsystem,” Journal of Computer, Signal, and System Research, vol. 2, no. 6, pp. 49–56, 2025.