Research Article

Novel Defense Schemes for Artificial Intelligence Deployed in Edge Computing Environment

Figure 2

Poisoning attack and backdoor attack in AI training.