Adversarial Attacks and Defenses for Deployed AI Models

被引:4
|
作者
Gupta, Kishor Datta [1 ]
Dasgupta, Dipankar [2 ]
机构
[1] Clark Atlanta Univ, Atlanta, GA 30314 USA
[2] Univ Memphis, Memphis, TN 38152 USA
关键词
15;
D O I
10.1109/MITP.2022.3180330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the surge in the adoption of AI/ML techniques in industry, adversarial challenges are also on the rise and defense strategies need to be configured accordingly. While it is crucial to formulate new attack methods (similar to Fuzz testing) and devise novel defense strategies for coverage and robustness, it is also imperative to recognize who is responsible for implementing, validating, and justifying the necessity of AI/ML defenses. In particular, which components of the learning system are vulnerable to what type of adversarial attacks, and the expertise needed to realize the severity of such adversarial attacks. Also, how to evaluate and address the adversarial challenges to recommend defense strategies for different applications. We would like to open a discussion on the skill set needed to examine and implement various defenses for emerging adversarial attacks.
引用
收藏
页码:37 / 41
页数:5
相关论文
共 50 条
  • [21] Adversarial Examples: Attacks and Defenses for Deep Learning
    Yu, Xiaoyong
    He, Pan
    Zhu, Qile
    Li, Xiaolin
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (09) : 2805 - 2824
  • [22] Adversarial examples: attacks and defenses in the physical world
    Ren, Huali
    Huang, Teng
    Yan, Hongyang
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (11) : 3325 - 3336
  • [23] Adversarial Attacks and Defenses: Frontiers, Advances and Practice
    Xu, Han
    Li, Yaxin
    Jin, Wei
    Tang, Jiliang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 3541 - 3542
  • [24] Survey of Attacks and Defenses on Edge-Deployed Neural Networks
    Isakov, Mihailo
    Gadepally, Vijay
    Gettings, Karen M.
    Kinsy, Michel A.
    2019 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2019,
  • [25] Addressing Adversarial Attacks in IoT Using Deep Learning AI Models
    Bommana, Sesibhushana Rao
    Veeramachaneni, Sreehari
    Ahmed, Syed Ershad
    Srinivas, M. B.
    IEEE ACCESS, 2025, 13 : 50437 - 50449
  • [26] Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems
    Tian, Jiwei
    Li, Tengyao
    Shang, Fute
    Cao, Kunrui
    Li, Jing
    Ozay, Mete
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2019,
  • [27] Adversarial attacks and defenses in explainable artificial intelligence: A survey
    Baniecki, Hubert
    Biecek, Przemyslaw
    INFORMATION FUSION, 2024, 107
  • [28] Adversarial attacks and defenses for digital communication signals identification
    Tian, Qiao
    Zhang, Sicheng
    Mao, Shiwen
    Lin, Yun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (03) : 756 - 764
  • [29] Adversarial Example Attacks and Defenses in DNS Data Exfiltration
    Savic, Izabela
    Yan, Haonan
    Lin, Xiaodong
    Gillis, Daniel
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2023, 2024, 2004 : 147 - 163
  • [30] BENCHMARKING ADVERSARIAL ATTACKS AND DEFENSES IN REMOTE SENSING IMAGES
    Zhang, Hanmeng
    Jiang, Xue
    IGARSS 2023 - 2023 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, 2023, : 899 - 902