Adversarial Attacks and Defenses for Deployed AI Models

被引:4
|
作者
Gupta, Kishor Datta [1 ]
Dasgupta, Dipankar [2 ]
机构
[1] Clark Atlanta Univ, Atlanta, GA 30314 USA
[2] Univ Memphis, Memphis, TN 38152 USA
关键词
15;
D O I
10.1109/MITP.2022.3180330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the surge in the adoption of AI/ML techniques in industry, adversarial challenges are also on the rise and defense strategies need to be configured accordingly. While it is crucial to formulate new attack methods (similar to Fuzz testing) and devise novel defense strategies for coverage and robustness, it is also imperative to recognize who is responsible for implementing, validating, and justifying the necessity of AI/ML defenses. In particular, which components of the learning system are vulnerable to what type of adversarial attacks, and the expertise needed to realize the severity of such adversarial attacks. Also, how to evaluate and address the adversarial challenges to recommend defense strategies for different applications. We would like to open a discussion on the skill set needed to examine and implement various defenses for emerging adversarial attacks.
引用
收藏
页码:37 / 41
页数:5
相关论文
共 50 条
  • [31] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu A.-S.
    Guo J.
    Li S.-M.
    Xiao Y.-S.
    Liu X.-L.
    Tao D.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [32] Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
    Xu, Han
    Ma, Yao
    Liu, Hao-Chen
    Deb, Debayan
    Liu, Hui
    Tang, Ji-Liang
    Jain, Anil K.
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2020, 17 (02) : 151 - 178
  • [33] Adversarial Human Context Recognition: Evasion Attacks and Defenses
    Alajaji, Abdulaziz
    Gerych, Walter
    Chandrasekaran, Kavin
    Buquicchio, Luke
    Agu, Emmanuel
    Rundensteiner, Elke
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 223 - 232
  • [34] Adversarial Attacks and Defenses for Semantic Communication in Vehicular Metaverses
    Kang, Jiawen
    He, Jiayi
    Du, Hongyang
    Xiong, Zehui
    Yang, Zhaohui
    Huang, Xumin
    Xie, Shengli
    IEEE WIRELESS COMMUNICATIONS, 2023, 30 (04) : 48 - 55
  • [35] Adversarial Attacks and Defenses in Physiological Computing: A Systematic Review
    The Ministry of Education Key Laboratory of Image Processing and Intelligent Control, School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan
    430074, China
    不详
    311121, China
    不详
    430074, China
    不详
    430074, China
    不详
    MI
    48109, United States
    不详
    430074, China
    arXiv, 1600,
  • [36] Adversarial Attacks and Defenses in Images,Graphs and Text: A Review
    Han Xu
    Yao Ma
    Hao-Chen Liu
    Debayan Deb
    Hui Liu
    Ji-Liang Tang
    Anil K.Jain
    International Journal of Automation and Computing, 2020, 17 (02) : 151 - 178
  • [37] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
    Lan, Jiahe
    Zhang, Rui
    Yan, Zheng
    Wang, Jie
    Chen, Yu
    Hou, Ronghui
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 127
  • [38] Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
    Han Xu
    Yao Ma
    Hao-Chen Liu
    Debayan Deb
    Hui Liu
    Ji-Liang Tang
    Anil K. Jain
    International Journal of Automation and Computing, 2020, 17 : 151 - 178
  • [39] Adversarial attacks and defenses for digital communication signals identification
    Qiao Tian
    Sicheng Zhang
    Shiwen Mao
    Yun Lin
    Digital Communications and Networks, 2024, 10 (03) : 756 - 764
  • [40] Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
    Chen, Zesheng
    Li, Jack
    Chen, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32645 - 32655