Adversarial Attacks and Defenses for Deployed AI Models

被引:4
|
作者
Gupta, Kishor Datta [1 ]
Dasgupta, Dipankar [2 ]
机构
[1] Clark Atlanta Univ, Atlanta, GA 30314 USA
[2] Univ Memphis, Memphis, TN 38152 USA
关键词
15;
D O I
10.1109/MITP.2022.3180330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the surge in the adoption of AI/ML techniques in industry, adversarial challenges are also on the rise and defense strategies need to be configured accordingly. While it is crucial to formulate new attack methods (similar to Fuzz testing) and devise novel defense strategies for coverage and robustness, it is also imperative to recognize who is responsible for implementing, validating, and justifying the necessity of AI/ML defenses. In particular, which components of the learning system are vulnerable to what type of adversarial attacks, and the expertise needed to realize the severity of such adversarial attacks. Also, how to evaluate and address the adversarial challenges to recommend defense strategies for different applications. We would like to open a discussion on the skill set needed to examine and implement various defenses for emerging adversarial attacks.
引用
收藏
页码:37 / 41
页数:5
相关论文
共 50 条
  • [41] Adversarial attacks and defenses in physiological computing:a systematic review
    Dongrui Wu
    Jiaxin Xu
    Weili Fang
    Yi Zhang
    Liuqing Yang
    Xiaodong Xu
    Hanbin Luo
    Xiang Yu
    National Science Open, 2023, 2 (01) : 65 - 93
  • [42] Text Adversarial Attacks and Defenses: Issues, Taxonomy, and Perspectives
    Han, Xu
    Zhang, Ying
    Wang, Wei
    Wang, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [43] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [44] Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review
    Zhang, Shaobo
    Pan, Yimeng
    Liu, Qin
    Yan, Zheng
    Choo, Kim-kwang raymond
    Wang, Guojun
    ACM COMPUTING SURVEYS, 2025, 57 (04)
  • [45] Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses
    Juraev, Firuz
    Abuhamad, Mohammed
    Chan-Tin, Eric
    Thiruvathukal, George K.
    Abuhmed, Tamer
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [46] Robustness Evaluation of Cloud-Deployed Large Language Models against Chinese Adversarial Text Attacks
    Zhang, Yunting
    Ye, Lin
    Li, Baisong
    Zhang, Hongli
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 438 - 442
  • [47] Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
    Li, Deqiang
    Li, Qianmu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3886 - 3900
  • [48] Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
    Li, Jiao
    Liu, Yang
    Chen, Tao
    Xiao, Zhen
    Li, Zhenjiang
    Wang, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5103 - 5115
  • [49] Adversarial attacks and defenses using feature-space stochasticity
    Ukita, Jumpei
    Ohki, Kenichi
    NEURAL NETWORKS, 2023, 167 : 875 - 889
  • [50] Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
    Zhou, Shuai
    Liu, Chi
    Ye, Dayong
    Zhu, Tianqing
    Zhou, Wanlei
    Yu, Philip S.
    ACM COMPUTING SURVEYS, 2023, 55 (08)