Adversarial Attacks and Defenses in Deep Learning

With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical to ensure the security and robustness of the deployed algorithms. Recently, the security vulnerability of DL algorithms to adversarial samples has been widely recognized. The fabricated samp...

Full description

Saved in:
Bibliographic Details
Published inEngineering (Beijing, China) Vol. 6; no. 3; pp. 346 - 360
Main Authors Ren, Kui, Zheng, Tianhang, Qin, Zhan, Liu, Xue
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.03.2020
College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China%Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 2E8, Canada%School of Computer Science, McGill University, Montreal, QC H3A 0E9, Canada
Institute of Cyberspace Research, Zhejiang University, Hangzhou 310027, China
Elsevier
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical to ensure the security and robustness of the deployed algorithms. Recently, the security vulnerability of DL algorithms to adversarial samples has been widely recognized. The fabricated samples can lead to various misbehaviors of the DL models while being perceived as benign by humans. Successful implementations of adversarial attacks in real physical-world scenarios further demonstrate their practicality. Hence, adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years. In this paper, we first introduce the theoretical foundations, algorithms, and applications of adversarial attack techniques. We then describe a few research efforts on the defense techniques, which cover the broad frontier in the field. Several open problems and challenges are subsequently discussed, which we hope will provoke further research efforts in this critical area.
ISSN:2095-8099
DOI:10.1016/j.eng.2019.12.012