HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 42888-2023 English PDF

US$649.00 ยท In stock
Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 42888-2023: Information security technology - Assessment specification for security of machine learning algorithms
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 42888-2023English649 Add to Cart 6 days [Need to translate] Information security technology - Assessment specification for security of machine learning algorithms Valid GB/T 42888-2023

PDF similar to GB/T 42888-2023


Standard similar to GB/T 42888-2023

GB/T 42453   GB/T 42447   GB/T 42460   GB/Z 42885   GB/T 42884   

Basic data

Standard ID GB/T 42888-2023 (GB/T42888-2023)
Description (Translated English) Information security technology - Assessment specification for security of machine learning algorithms
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 34,370
Date of Issue 2023-08-06
Date of Implementation 2024-03-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 42888-2023: Information security technology - Assessment specification for security of machine learning algorithms


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standards of People's Republic of China Information security technology Machine learning algorithm security assessment specifications Published on 2023-08-06 2024-03-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration Committee

Table of contents

Preface III 1 Scope 1 2 Normative reference documents 1 3 Terms and Definitions 1 4 Overview 2 4.1 Safety Principle 2 4.2 Safety requirement classification 2 5 Machine learning algorithm technical security requirements and assessment methods 2 5.1 Safety requirements 2 5.2 Assessment Method 5 6 Machine learning algorithm service security requirements and assessment methods 9 6.1 Safety requirements 9 6.2 Assessment methods 9 7 Machine learning algorithm security assessment process 11 7.1 Process requirements 11 7.2 Preparing for assessment 11 7.3 Evaluation Plan 11 7.4 Assessment Execution 12 7.5 Assessment Conclusion 12 7.6 Assessment Report 12 Appendix A (Normative) Security Requirements for Algorithm Recommendation Services 14 Appendix B (normative) Algorithm recommendation service evaluation method 21 Reference 29

Foreword

This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents. This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. Beijing Saixi Technology Development Co., Ltd., Institute of Computing Technology, Chinese Academy of Sciences, Tsinghua University, National Planning Computer Network Emergency Technology Coordination Center, Shanghai SenseTime Intelligent Technology Co., Ltd., Beijing Ruilai Intelligent Technology Co., Ltd., Alibaba (China) Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, China Academy of Information and Communications Technology, China Electronics Technology Group Corporation Fifteenth Research Institute Institute, National Information Technology Security Research Center, Guangzhou University, Peking University, East China Normal University, Beihang University, Huawei Technologies Co., Ltd. Co., Ltd., Beijing Megvii Technology Co., Ltd., Beijing Baidu Network Technology Co., Ltd., Shenzhen Tencent Computer Systems Co., Ltd., Zhejiang University School, Beijing Qihu Technology Co., Ltd., Beijing Xiaoju Technology Co., Ltd., Anhui Engineering University, Beijing Zhizhi Tianxia Technology Co., Ltd., Beijing Jiaotong University, Zhejiang University of Technology, Shanghai Industrial Control Safety Innovation Technology Co., Ltd., People's Public Security University of China, Shenzhen Big Data Research Academy, Beijing Institute of Computer Technology and Applications, Institute of Automation, Chinese Academy of Sciences, Shanghai Suiyuan Technology Co., Ltd., Fengtai Technology (Beijing) Co., Ltd., China Electronics Technology Standardization Institute. The main drafters of this document. Shangguan Xiaoli, Hao Chunliang, Xu Xiaogeng, Hu Ying, Chen Zhong, Shen Huawei, Jiang Hui, Mei Jingqing, Zhang Yuguang, Peng Juntao, Guo Yan, Li Pengxiao, Ai Zhengyang, Zhao Yunwei, Han Han, Liu Ming, Yin Zhiyi, Pang Liang, Wang Xiaoshi, Liu Zongzhen, Zhou Xi, Meng Guozhu, Jing Huiyun, Zhang Linlin, Zhu Chunchao, Huo Shanshan, Liu Jian, Liu He, Su Hang, Jin Tao, Liu Jiqiang, Ren Kui, Zhang Xudong, Cheng Jin, Zhu Hongru, Yang Tao, Li Qin, Liu Xianglong, Wang Yifei, Wu Geng, He Ran, Gu Zhaoquan, Li Shi, Cao Xiaoqi, Yan Minrui, Fu Yingbo, Guo Ying, Sun Air Force, Tang Jiayu, Liu Xize, Wang Zhelin, Ren Lu, Xu Yongtai, Zhang Yi, Qin Zhan, An Zeliang, Xu Yuqing, Li Xue, Li Dahai, Xu Guangxia, Bao Shenfu, Guo Jianling, Xuan Qi, Zhang Shitian, Zhao Yongxin, Wang Jiao, Wang Bingzheng, Lu Tianliang, Wu Baoyuan, Han Lei, Zhang Yutong, Peng Quan. Information security technology Machine learning algorithm security assessment specifications

1 Scope

This document specifies the security requirements and assessment methods for machine learning algorithm technologies and services, as well as the machine learning algorithm security assessment process. This document is suitable for guiding machine learning algorithm providers to ensure the security of the machine learning algorithm life cycle and carry out machine learning algorithm security. A comprehensive assessment can also provide reference for regulatory assessment.

2 Normative reference documents

This document has no normative references.

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Algorithms that functional units improve their performance by learning new knowledge and skills or sorting out existing knowledge and skills. 3.2 Organizations that utilize machine learning algorithms to perform specific functions. Note. This document is referred to as algorithm provider, including algorithm technology providers and algorithm service providers. Algorithm technology provider refers to the development and Provider, algorithm service provider refers to a service provider that uses applied algorithm technology. 3.3 Services that apply algorithm recommendation technology to provide information. Note 1.Application algorithm recommendation technology refers to the use of machine learning algorithms to generate synthetic categories, personalized push categories, sorting and selection categories, retrieval and filtering categories, and scheduling decisions. Categorization and other algorithmic technologies are used to provide information to users. Note 2.This document refers to algorithms such as generation and synthesis, personalized push, sorting and selection, retrieval and filtering, and scheduling and decision-making as five categories of algorithms. 3.4 algorithm lifecyclealgorithmlifecycle The evolution of machine learning algorithms from design to retirement. Note 1.The algorithm life cycle includes design and development, verification and confirmation, deployment and operation, maintenance and upgrade, and decommissioning. Note 2.General algorithm services are in the deployment and running stage.