{"title":"Discussion Paper: The Integrity of Medical AI","authors":"Yisroel Mirsky","doi":"10.1145/3494109.3527191","DOIUrl":null,"url":null,"abstract":"Deep learning has proven itself to be an incredible asset to the medical community. However, with offensive AI, the technology can be turned against medical community; adversarial samples can be used to cause misdiagnosis and medical deepfakes can be used fool both radiologists and machines alike. In this short discussion paper, we talk about the issue of offensive AI and from the perspective of healthcare. We discuss how defense researchers in this domain have responded to the threat and their the current challenges. We conclude by arguing that conventional security mechanisms are a better approach towards mitigating these threats over algorithm based solutions.","PeriodicalId":140739,"journal":{"name":"Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3494109.3527191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Deep learning has proven itself to be an incredible asset to the medical community. However, with offensive AI, the technology can be turned against medical community; adversarial samples can be used to cause misdiagnosis and medical deepfakes can be used fool both radiologists and machines alike. In this short discussion paper, we talk about the issue of offensive AI and from the perspective of healthcare. We discuss how defense researchers in this domain have responded to the threat and their the current challenges. We conclude by arguing that conventional security mechanisms are a better approach towards mitigating these threats over algorithm based solutions.