Adversarial Attacks and Defenses in Physiological Computing: A Systematic Review

02/04/2021
by   Dongrui Wu, et al.
0

Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based biometrics. Physiological computing increases the communication bandwidth from the user to the computer, but is also subject to various types of adversarial attacks, in which the attacker deliberately manipulates the training and/or test examples to hijack the machine learning algorithm output, leading to possibly user confusion, frustration, injury, or even death. However, the vulnerability of physiological computing systems has not been paid enough attention to, and there does not exist a comprehensive review on adversarial attacks to it. This paper fills this gap, by providing a systematic review on the main research areas of physiological computing, different types of adversarial attacks and their applications to physiological computing, and the corresponding defense strategies. We hope this review will attract more research interests on the vulnerability of physiological computing systems, and more importantly, defense strategies to make them more secure.

READ FULL TEXT

page 6

page 9

research
06/27/2021

Who is Responsible for Adversarial Defense?

We have seen a surge in research aims toward adversarial attacks and def...
research
04/01/2022

Shared User Interfaces of Physiological Data: Systematic Review of Social Biofeedback Systems and Contexts in HCI

As an emerging interaction paradigm, physiological computing is increasi...
research
01/14/2021

Adversarial Machine Learning in Text Analysis and Generation

The research field of adversarial machine learning witnessed a significa...
research
06/01/2023

Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review

As the adoption of machine learning models increases, ensuring robust mo...
research
05/22/2023

The defender's perspective on automatic speaker verification: An overview

Automatic speaker verification (ASV) plays a critical role in security-s...
research
07/21/2020

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

This work provides the community with a timely comprehensive review of b...
research
08/26/2020

Disentangled Adversarial Autoencoder for Subject-Invariant Physiological Feature Extraction

Recent developments in biosignal processing have enabled users to exploi...

Please sign up or login with your details

Forgot password? Click here to reset