Evaluating the Vulnerabilities in ML systems in terms of adversarial attacks

08/24/2023
by   John Harshith, et al.
0

There have been recent adversarial attacks that are difficult to find. These new adversarial attacks methods may pose challenges to current deep learning cyber defense systems and could influence the future defense of cyberattacks. The authors focus on this domain in this research paper. They explore the consequences of vulnerabilities in AI systems. This includes discussing how they might arise, differences between randomized and adversarial examples and also potential ethical implications of vulnerabilities. Moreover, it is important to train the AI systems appropriately when they are in testing phase and getting them ready for broader use.

READ FULL TEXT

page 9

page 10

research
06/27/2021

Who is Responsible for Adversarial Defense?

We have seen a surge in research aims toward adversarial attacks and def...
research
05/23/2023

Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

In July 2022, the Center for Security and Emerging Technology (CSET) at ...
research
07/03/2023

From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy

Undoubtedly, the evolution of Generative AI (GenAI) models has been the ...
research
03/29/2021

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Image classification is a common step in image recognition for machine l...
research
09/23/2020

A Partial Break of the Honeypots Defense to Catch Adversarial Attacks

A recent defense proposes to inject "honeypots" into neural networks in ...
research
09/26/2018

Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward

Future communications and data networks are expected to be largely cogni...
research
01/23/2023

Practical Adversarial Attacks Against AI-Driven Power Allocation in a Distributed MIMO Network

In distributed multiple-input multiple-output (D-MIMO) networks, power c...

Please sign up or login with your details

Forgot password? Click here to reset