Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity

被引:30
|
作者
Zhou, Shuai [1 ]
Liu, Chi [1 ]
Ye, Dayong [1 ]
Zhu, Tianqing [1 ]
Zhou, Wanlei [2 ]
Yu, Philip S. [3 ]
机构
[1] Univ Technol Sydney, POB 123, Broadway, NSW 2007, Australia
[2] City Univ Macau, POB 123,Ave Padre Tomas Pereira Taipa, Taipa, Macau, Peoples R China
[3] Univ Illinois, POB 123, Chicago, IL USA
基金
澳大利亚研究理事会;
关键词
Deep learning; adversarial attacks and defenses; cybersecurity; advanced persistent threats;
D O I
10.1145/3547330
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The outstanding performance of deep neural networks has promoted deep learning applications in a broad set of domains. However, the potential risks caused by adversarial samples have hindered the large-scale deployment of deep learning. In these scenarios, adversarial perturbations, imperceptible to human eyes, significantly decrease the model's final performance. Many papers have been published on adversarial attacks and their countermeasures in the realm of deep learning. Most focus on evasion attacks, where the adversarial examples are found at test time, as opposed to poisoning attacks where poisoned data is inserted into the training data. Further, it is difficult to evaluate the real threat of adversarial attacks or the robustness of a deep learning model, as there are no standard evaluation methods. Hence, with this article, we review the literature to date. Additionally, we attempt to offer the first analysis framework for a systematic understanding of adversarial attacks. The framework is built from the perspective of cybersecurity to provide a lifecycle for adversarial attacks and defenses.
引用
收藏
页数:39
相关论文
共 50 条
  • [21] Evaluating the Effectiveness of Attacks and Defenses on Machine Learning Through Adversarial Samples
    Gala, Viraj R.
    Schneider, Martin A.
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, : 90 - 97
  • [22] Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
    Anthi, Eirini
    Williams, Lowri
    Rhode, Matilda
    Burnap, Pete
    Wedgbury, Adam
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [23] A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning
    Sadeghi, Koosha
    Banerjee, Ayan
    Gupta, Sandeep K. S.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (04): : 450 - 467
  • [24] DeepRobust: a Platform for Adversarial Attacks and Defenses
    Li, Yaxin
    Jin, Wei
    Xu, Han
    Tang, Jiliang
    [J]. THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 16078 - 16080
  • [25] Cybersecurity in Deep Learning Techniques: Detecting Network Attacks
    Ghazal, Shatha Fawaz
    Mjlae, Salameh A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 221 - 230
  • [26] On Adaptive Attacks to Adversarial Example Defenses
    Tramer, Florian
    Carlini, Nicholas
    Brendel, Wieland
    Madry, Aleksander
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 33, NEURIPS 2020, 2020, 33
  • [27] Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity
    Aldhyani, Theyazn H. H.
    Alkahtani, Hasan
    [J]. SENSORS, 2022, 22 (01)
  • [28] Visual privacy attacks and defenses in deep learning: a survey
    Zhang, Guangsheng
    Liu, Bo
    Zhu, Tianqing
    Zhou, Andi
    Zhou, Wanlei
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) : 4347 - 4401
  • [29] A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses
    Liu, Peidong
    He, Longtao
    Li, Zhoujun
    [J]. IEEE ACCESS, 2023, 11 : 26033 - 26047
  • [30] Visual privacy attacks and defenses in deep learning: a survey
    Guangsheng Zhang
    Bo Liu
    Tianqing Zhu
    Andi Zhou
    Wanlei Zhou
    [J]. Artificial Intelligence Review, 2022, 55 : 4347 - 4401