Overview on Adversarial Attacks and Defenses in Deep Learning Systems

Authors

  • Nilima D.Bobade Assistant Professor AT Prof. Ram Meghe Institute of Technology & Research Badnera
  • Swati S. Sherekar Professor AT S.G.B.A.U/ Computer Department, Amravti, India

Keywords:

Adversarial attacks and defenses, Deep learning, Machine learning

Abstract

In "machine learning and deep neural networks", there is a significant surge in interest in adversarial assaults and answers due to the quickly growing Internet usage of deep learning and related scenarios. The use of deep neural networks in models for classification is highlighted in this article, which provides an extensive overview of the most recent advancements in "adversarial attack and defense tactics". People who manipulate the deep learning model are prone to making mistakes that lead to incorrect predictions and inappropriate actions. Learning the specified approach is crucial to keeping the machine in good working order and preventing it from being disrupted by hostile attack users. Through meticulous testing and data analysis, the study has produced verifiable evidence to support the ongoing discussion in the area of deep learning security.

References

[1] X. Yuan, P. He, Q. Zhu, and X. Li, "Adversarial Examples: Attacks and Defenses for Deep Learning," IEEE Trans. neural networks Learn. Syst., vol. 30, no. 9, pp. 2805-2824, 2019,

https://doi.org/10.1109/TNNLS.2018.2886017

[2] K. S. Begum et al., "Adversarial Attacks and Defenses in Deep Learning Models," vol. 12, pp. 857-865, 2024.

[3] Y. L. Khaleel, M. A. Habeeb, and H. Alnabulsi, "Adversarial Attacks in Machine Learning: Key Insights and Defense Approaches," Appl. Data Sci. Anal., pp. 121-147, 2024,

https://doi.org/10.58496/ADSA/2024/011

[4] Y. Wang et al., "Adversarial Attacks and Defenses in Machine Learning-Powered Networks : A Contemporary Survey," pp. 1-46, 2023.

[5] G. W. Muoka et al., "A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense," Mathematics, vol. 11, no. 20, 2023,

https://doi.org/10.3390/math11204272

[6] S. Zhou, C. Liu, D. Ye, T. Zhu, W. Zhou, and P. S. Yu, "Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity," ACM Comput. Surv., vol. 55, no. 8, 2022,

https://doi.org/10.1145/3547330

[7] X. Chen, S. Li, and H. Huang, "Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview," Appl. Sci., vol. 11, no. 18, 2021,

https://doi.org/10.3390/app11188450

[8] K. Ren, T. Zheng, Z. Qin, and X. Liu, "Adversarial Attacks and Defenses in Deep Learning," Engineering, vol. 6, no. 3, pp. 346-360, 2020,

https://doi.org/10.1016/j.eng.2019.12.012

Downloads

Published

2024-06-07

How to Cite

[1]
D.Bobade, N. and S. Sherekar, S. 2024. Overview on Adversarial Attacks and Defenses in Deep Learning Systems. AG Volumes. 1, 1 (Jun. 2024), 37–41.