Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity

被引:30
|
作者
Zhou, Shuai [1 ]
Liu, Chi [1 ]
Ye, Dayong [1 ]
Zhu, Tianqing [1 ]
Zhou, Wanlei [2 ]
Yu, Philip S. [3 ]
机构
[1] Univ Technol Sydney, POB 123, Broadway, NSW 2007, Australia
[2] City Univ Macau, POB 123,Ave Padre Tomas Pereira Taipa, Taipa, Macau, Peoples R China
[3] Univ Illinois, POB 123, Chicago, IL USA
基金
澳大利亚研究理事会;
关键词
Deep learning; adversarial attacks and defenses; cybersecurity; advanced persistent threats;
D O I
10.1145/3547330
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The outstanding performance of deep neural networks has promoted deep learning applications in a broad set of domains. However, the potential risks caused by adversarial samples have hindered the large-scale deployment of deep learning. In these scenarios, adversarial perturbations, imperceptible to human eyes, significantly decrease the model's final performance. Many papers have been published on adversarial attacks and their countermeasures in the realm of deep learning. Most focus on evasion attacks, where the adversarial examples are found at test time, as opposed to poisoning attacks where poisoned data is inserted into the training data. Further, it is difficult to evaluate the real threat of adversarial attacks or the robustness of a deep learning model, as there are no standard evaluation methods. Hence, with this article, we review the literature to date. Additionally, we attempt to offer the first analysis framework for a systematic understanding of adversarial attacks. The framework is built from the perspective of cybersecurity to provide a lifecycle for adversarial attacks and defenses.
引用
收藏
页数:39
相关论文
共 50 条
  • [1] Adversarial Attacks and Defenses in Deep Learning
    Ren, Kui
    Zheng, Tianhang
    Qin, Zhan
    Liu, Xue
    [J]. ENGINEERING, 2020, 6 (03) : 346 - 360
  • [2] Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
    Macas, Mayra
    Wu, Chunming
    Fuertes, Walter
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [3] Adversarial Attacks and Defenses for Deep Learning Models
    Li, Minghui
    Jiang, Peipei
    Wang, Qian
    Shen, Chao
    Li, Qi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (05): : 909 - 926
  • [4] Adversarial Examples: Attacks and Defenses for Deep Learning
    Yu, Xiaoyong
    He, Pan
    Zhu, Qile
    Li, Xiaolin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (09) : 2805 - 2824
  • [5] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu, Ai-Shan
    Guo, Jun
    Li, Si-Min
    Xiao, Yi-Song
    Liu, Xiang-Long
    Tao, Da-Cheng
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [6] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    [J]. NEUROCOMPUTING, 2022, 514 : 162 - 181
  • [7] Deep learning adversarial attacks and defenses on license plate recognition system
    Vizcarra, Conrado
    Alhamed, Shadan
    Algosaibi, Abdulelah
    Alnaeem, Mohammed
    Aldalbahi, Adel
    Aljaafari, Nura
    Sawalmeh, Ahmad
    Nazzal, Mahmoud
    Khreishah, Abdallah
    Alhumam, Abdulaziz
    Anan, Muhammad
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 11627 - 11644
  • [8] How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
    Costa, Joana C.
    Roxo, Tiago
    Proenca, Hugo
    Inacio, Pedro Ricardo Morais
    [J]. IEEE ACCESS, 2024, 12 : 61113 - 61136
  • [9] An Information Geometric Perspective to Adversarial Attacks and Defenses
    Naddeo, Kyle
    Bouaynaya, Nidhal
    Shterenberg, Roman
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [10] Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles
    Tian, Jiwei
    Wang, Buhong
    Guo, Rongxiao
    Wang, Zhen
    Cao, Kunrui
    Wang, Xiaodong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22399 - 22409