{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T06:49:51Z","timestamp":1776494991764,"version":"3.51.2"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000266","name":"RCUK | Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N023013\/1"],"award-info":[{"award-number":["EP\/N023013\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"RCUK | Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N023013\/1"],"award-info":[{"award-number":["EP\/N023013\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010418","name":"MOD | Defence Science and Technology Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Google UK Limited Facebook Inc"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Mach Intell"],"DOI":"10.1038\/s42256-019-0109-1","type":"journal-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T17:02:46Z","timestamp":1573491766000},"page":"557-560","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":166,"title":["Trusting artificial intelligence in cybersecurity is a double-edged sword"],"prefix":"10.1038","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1181-649X","authenticated-orcid":false,"given":"Mariarosaria","family":"Taddeo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tom","family":"McCutcheon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5444-2280","authenticated-orcid":false,"given":"Luciano","family":"Floridi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"109_CR1","unstructured":"The Global Risks Report 2018 (World Economic Forum, 2018)."},{"key":"109_CR2","unstructured":"The 2019 Official Annual Cybercrime Report (Herjavec Group, 2019)."},{"key":"109_CR3","unstructured":"Borno, R. The first imperative: the best digital offense starts with the best security defense. Cisco https:\/\/newsroom.cisco.com\/feature-content?articleId=1843565 (2017)."},{"key":"109_CR4","unstructured":"Breach level index. Gemalto https:\/\/breachlevelindex.com\/data-breach-library (2018)."},{"key":"109_CR5","unstructured":"Microsoft Defender ATP Research Team. Protecting the protector: hardening machine learning defenses against adversarial attacks. Microsoft https:\/\/www.microsoft.com\/security\/blog\/2018\/08\/09\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/ (2018)."},{"key":"109_CR6","doi-asserted-by":"crossref","unstructured":"King, T. M., Arbon, J., Santiago, D., Adamo, D., Chin, W. & Shanmugam, R. AI for testing today and tomorrow: industry perspectives. In 2019 IEEE International Conference on Artificial Intelligence Testing 81\u201388 (IEEE, 2019).","DOI":"10.1109\/AITest.2019.000-3"},{"key":"109_CR7","unstructured":"Riley, S. DarkLight offers first of its kind artificial intelligence to enhance cybersecurity defenses. Business Wire https:\/\/www.businesswire.com\/news\/home\/20170726005117\/en\/darklight-offers-kind-artificial-intelligence-enhance-cybersecurity (2017)."},{"key":"109_CR8","unstructured":"Acalvio autonomous deception. Acalvio https:\/\/www.acalvio.com\/ (2019)."},{"key":"109_CR9","unstructured":"Gens, F. et al. IDC FutureScape: worldwide it industry 2019 predictions. IDC https:\/\/www.idc.com\/getdoc.jsp?containerId=US44403818 (2018)."},{"key":"109_CR10","unstructured":"Mittal, S., Joshi, A. & Finin, T. Cyber-All-Intel: an AI for security related threat intelligence. Preprint at https:\/\/arxiv.org\/abs\/1905.02895 (2019)."},{"key":"109_CR11","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1038\/d41586-018-04602-6","volume":"556","author":"M Taddeo","year":"2018","unstructured":"Taddeo, M. & Floridi, L. Regulate artificial intelligence to avert cyber arms race. Nature 556, 296\u2013298 (2018).","journal-title":"Nature"},{"key":"109_CR12","unstructured":"AI in cybersecurity market. MarketsandMarkets https:\/\/www.marketsandmarkets.com\/market-reports\/ai-in-cybersecurity-market-224437074.html (2019)."},{"key":"109_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11023-010-9201-3","volume":"20","author":"M Taddeo","year":"2010","unstructured":"Taddeo, M. Modelling trust in artificial agents, a first step toward the analysis of e-trust. Minds Mach. 20, 243\u2013257 (2010).","journal-title":"Minds Mach."},{"key":"109_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s12130-010-9113-9","volume":"23","author":"M Taddeo","year":"2010","unstructured":"Taddeo, M. Trust in technology: a distinctive and a problematic relation. Know Technol. Pol. 23, 283\u2013286 (2010).","journal-title":"Know Technol. Pol."},{"key":"109_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B. & Roli, F. Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317\u2013331 (2018).","journal-title":"Pattern Recogn."},{"key":"109_CR16","doi-asserted-by":"crossref","unstructured":"Jagielski, M. et al. Manipulating machine learning: poisoning attacks and countermeasures for regression learning. Preprint at https:\/\/arxiv.org\/abs\/1804.00308 (2018).","DOI":"10.1109\/SP.2018.00057"},{"key":"109_CR17","unstructured":"Athalye, A., Engstrom, L., Ilyas, A. & Kwok, K. Synthesizing robust adversarial examples. Preprint at https:\/\/arxiv.org\/abs\/1707.07397 (2017)."},{"key":"109_CR18","unstructured":"Liao, C., Zhong, H., Squicciarini, A., Zhu, S. & Miller, D. Backdoor embedding in convolutional neural network models via invisible perturbation. Preprint at https:\/\/arxiv.org\/abs\/1808.10307 (2018)."},{"key":"109_CR19","doi-asserted-by":"crossref","unstructured":"Eykholt, K. et al. Robust physical-world attacks on deep learning visual classification. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition 1625\u20131634 (IEEE, 2018).","DOI":"10.1109\/CVPR.2018.00175"},{"key":"109_CR20","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L. & Reiter, M. K. Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 1528\u20131540 (ACM, 2016).","DOI":"10.1145\/2976749.2978392"},{"key":"109_CR21","unstructured":"Szegedy, C. et al. Intriguing properties of neural networks. Preprint at https:\/\/arxiv.org\/abs\/1312.6199 (2013)."},{"key":"109_CR22","unstructured":"Uesato, J., O\u2019Donoghue, B., van den Oord, A. & Kohli, P. Adversarial risk and the dangers of evaluating against weak attacks. Preprint at https:\/\/arxiv.org\/abs\/1802.05666 (2018)."},{"key":"109_CR23","unstructured":"Regulation of the European Parliament and of the Council on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526\/2013 (Cybersecurity Act). EUR-Lex http:\/\/data.europa.eu\/eli\/reg\/2019\/881\/oj (2019)."},{"key":"109_CR24","unstructured":"Ethics Guideline for Trustworthy AI (High-Level Expert Group on AI, 2019)."},{"key":"109_CR25","unstructured":"Artificial Intelligence and Machine Learning Applied to Cybersecurity (IEEE, 2017)."},{"key":"109_CR26","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s11023-017-9450-5","volume":"27","author":"M Taddeo","year":"2017","unstructured":"Taddeo, M. Trusting digital technologies correctly. Minds Mach. 27, 565\u2013568 (2017).","journal-title":"Minds Mach."},{"key":"109_CR27","unstructured":"Gu, T., Dolan-Gavitt, B. & Garg, S. BadNets: identifying vulnerabilities in the machine learning model supply chain. Preprint at https:\/\/arxiv.org\/abs\/1708.06733 (2017)."},{"key":"109_CR28","unstructured":"Sinha, A., Namkoong, H. & Duchi, J. Certifying some distributional robustness with principled adversarial training. Preprint at https:\/\/arxiv.org\/abs\/1710.10571 (2017)."},{"key":"109_CR29","doi-asserted-by":"crossref","unstructured":"Carlini, N. & Wagner, D. Towards evaluating the robustness of neural networks. In 2017 IEEE Symposium on Security and Privacy 39\u201357 (IEEE, 2017).","DOI":"10.1109\/SP.2017.49"},{"key":"109_CR30","doi-asserted-by":"crossref","unstructured":"Glaessgen, E. H. & Stargel, D. S. The digital twin paradigm for future NASA and U.S. Air Force vehicles. In 53rd Structures, Structural Dynamics, and Materials Conference: Special Session on the Digital Twin (NASA, 2012).","DOI":"10.2514\/6.2012-1818"},{"key":"109_CR31","doi-asserted-by":"publisher","first-page":"eaar7650","DOI":"10.1126\/scirobotics.aar7650","volume":"3","author":"G-Z Yang","year":"2018","unstructured":"Yang, G.-Z. et al. The grand challenges of Science Robotics. Sci. Robot. 3, eaar7650 (2018).","journal-title":"Sci. Robot."},{"key":"109_CR32","unstructured":"Recommendation of the Council on Artificial Intelligence (OECD, 2019)."}],"container-title":["Nature Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0109-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0109-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0109-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T19:45:05Z","timestamp":1671306305000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s42256-019-0109-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":32,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["109"],"URL":"https:\/\/doi.org\/10.1038\/s42256-019-0109-1","relation":{},"ISSN":["2522-5839"],"issn-type":[{"value":"2522-5839","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}