A Tutorial on Adversarial Learning Attacks and Countermeasures

02/21/2022
by   Cato Pauling, et al.
0

Machine learning algorithms are used to construct a mathematical model for a system based on training data. Such a model is capable of making highly accurate predictions without being explicitly programmed to do so. These techniques have a great many applications in all areas of the modern digital economy and artificial intelligence. More importantly, these methods are essential for a rapidly increasing number of safety-critical applications such as autonomous vehicles and intelligent defense systems. However, emerging adversarial learning attacks pose a serious security threat that greatly undermines further such systems. The latter are classified into four types, evasion (manipulating data to avoid detection), poisoning (injection malicious training samples to disrupt retraining), model stealing (extraction), and inference (leveraging over-generalization on training data). Understanding this type of attacks is a crucial first step for the development of effective countermeasures. The paper provides a detailed tutorial on the principles of adversarial machining learning, explains the different attack scenarios, and gives an in-depth insight into the state-of-art defense mechanisms against this rising threat .

READ FULL TEXT

page 14

page 21

research
06/28/2020

FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

Along with the proliferation of Artificial Intelligence (AI) and Interne...
research
05/09/2022

Model-Contrastive Learning for Backdoor Defense

Along with the popularity of Artificial Intelligence (AI) techniques, an...
research
02/26/2021

What Doesn't Kill You Makes You Robust(er): Adversarial Training against Poisons and Backdoors

Data poisoning is a threat model in which a malicious actor tampers with...
research
07/03/2023

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Data economy relies on data-driven systems and complex machine learning ...
research
08/03/2018

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

Over the past decade, side-channels have proven to be significant and pr...
research
06/30/2023

Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation

Information technology and telecommunications have rapidly permeated var...
research
05/01/2021

Adversarial Example Detection for DNN Models: A Review

Deep Learning (DL) has shown great success in many human-related tasks, ...

Please sign up or login with your details

Forgot password? Click here to reset