ARTÍCULO
TITULO

A Survey of Adversarial Attacks and Defenses for image data on Deep Learning

Huayu Li    
Dmitry Namiot    

Resumen

This article provides a detailed survey of the so-called adversarial attacks and defenses. These are special modifications to the input data of machine learning systems that are designed to cause machine learning systems to work incorrectly. The article discusses traditional approaches when the problem of constructing adversarial examples is considered as an optimization problem - the search for the minimum possible modifications of correlative data that ?deceive? the machine learning system. As tasks (goals) for adversarial attacks, classification systems are almost always considered. This corresponds, in practice, to the so-called critical systems (driverless vehicles, avionics, special applications, etc.). Attacks on such systems are obviously the most dangerous. In general, sensitivity to attacks means the lack of robustness of the machine (deep) learning system. It is robustness problems that are the main obstacle to the introduction of machine learning in the management of critical systems.

 Artículos similares

       
 
Guoqiang Zhou, Yi Fan, Jiachen Shi, Yuyuan Lu and Jun Shen    
Generative Adversarial Network (GAN), deemed as a powerful deep-learning-based silver bullet for intelligent data generation, has been widely used in multi-disciplines. Furthermore, conditional GAN (CGAN) introduces artificial control information on the ... ver más
Revista: Applied Sciences

 
Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud    
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the thr... ver más
Revista: Algorithms

 
Daniel S. Berman, Anna L. Buczak, Jeffrey S. Chavis and Cherita L. Corbett    
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural ... ver más
Revista: Information

 
Erjon Zoto,Mazaher Kianpour,Stewart James Kowalski,Edgar Alonso Lopez-Rojas     Pág. 65 - 75
Cybersecurity decisions are made across a range of social, technical, economic, regulatory and political domains. There is a gap between what companies and institutions plan to do while developing their internal IS-related policies and what should be don... ver más