{"type":"rich","categories":["DL"],"image_url":null,"published":"2026-02-07 13:46:00","provider_url":"https://hatena.blog","width":"100%","description":"\u30fb\u4eba\u9593\u4e2d\u5fc3\u306eAI\u793e\u4f1a\u539f\u5247DignityDiversity & InclusionSustainability \u30fb\u30cf\u30fc\u30c9\u30ed\u30fc\u6cd5\u5f8b\u306b\u3088\u308a\u898f\u5236 \u30fb\u30bd\u30d5\u30c8\u30ed\u30fc\u81ea\u4e3b\u7684\u306a\u898f\u5236 \u30fb\u4ee3\u7406\u5909\u6570\u30bb\u30f3\u30b7\u30c6\u30a3\u30d6\u60c5\u5831\u3092\u8aac\u660e\u3067\u304d\u308b\u5909\u6570 \u30fbAdversarial AttackAdversarial Example\u3092\u4f7f\u7528\u3057\u305f\u653b\u6483 \u30fbAdversarial Example\u6a5f\u68b0\u5b66\u7fd2\u30e2\u30c7\u30eb\u306e\u4e88\u6e2c\u3092\u610f\u56f3\u7684\u306b\u8aa4\u3089\u305b\u308b\u76ee\u7684\u3067\u4f5c\u3089\u308c\u305f\u30c7\u30fc\u30bf \u30fbAI\u653b\u6483\u624b\u6cd5Data TheftModel TheftData PoisoningModel Poisoning \u30fb\u30d5\u30a3\u30eb\u30bf\u30d0\u30d6\u30eb\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u304c\u30e6\u30fc\u30b6\u884c\u52d5\u5c65\u6b74\u3092\u5206\u6790\u3057\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u4fa1\u5024\u89b3\u306b\u6cbf\u3046\u60c5\u5831\u306e\u307f\u2026","version":"1.0","provider_name":"Hatena Blog","author_name":"HTN20190109","url":"https://htn20190109.hatenablog.com/entry/2026/02/07/134600","title":"\u7b2c10\u7ae0 AI\u502b\u7406\u30fbAI\u30ac\u30d0\u30ca\u30f3\u30b9","blog_title":"HTN20190109\u306e\u65e5\u8a18","blog_url":"https://htn20190109.hatenablog.com/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fhtn20190109.hatenablog.com%2Fentry%2F2026%2F02%2F07%2F134600\" title=\"\u7b2c10\u7ae0 AI\u502b\u7406\u30fbAI\u30ac\u30d0\u30ca\u30f3\u30b9 - HTN20190109\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","height":"190","author_url":"https://blog.hatena.ne.jp/HTN20190109/"}