How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses

被引:8
|
作者
Costa, Joana C. [1 ]
Roxo, Tiago [2 ]
Proenca, Hugo
Inacio, Pedro Ricardo Morais
机构
[1] Univ Beira Interior, Sins Lab, Inst Telecomunicacoes, P-6201001 Covilha, Portugal
[2] Univ Beira Interior, Dept Comp Sci, P-6201001 Covilha, Portugal
关键词
Surveys; Transformers; Perturbation methods; Object recognition; Deep learning; Closed box; Vectors; Adversarial attacks; adversarial defenses; datasets; evaluation metrics; review; vision transformers; RECOGNITION; VISION;
D O I
10.1109/ACCESS.2024.3395118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Learning is currently used to perform multiple tasks, such as object recognition, face recognition, and natural language processing. However, Deep Neural Networks (DNNs) are vulnerable to perturbations that alter the network prediction, named adversarial examples, which raise concerns regarding the usage of DNNs in critical areas, such as Self-driving Vehicles, Malware Detection, and Healthcare. This paper compiles the most recent adversarial attacks in Object Recognition, grouped by the attacker capacity and knowledge, and modern defenses clustered by protection strategies, providing background details to understand the topic of adversarial attacks and defenses. The new advances regarding Vision Transformers are also presented, which have not been previously done in the literature, showing the resemblance and dissimilarity between this architecture and Convolutional Neural Networks. Furthermore, the most used datasets and metrics in adversarial settings are summarized, along with datasets requiring further evaluation, which is another contribution. This survey compares the state-of-the-art results under different attacks for multiple architectures and compiles all the adversarial attacks and defenses with available code, comprising significant contributions to the literature. Finally, practical applications are discussed, and open issues are identified, being a reference for future works.
引用
收藏
页码:61113 / 61136
页数:24
相关论文
共 50 条
  • [31] Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
    Li, Jiao
    Liu, Yang
    Chen, Tao
    Xiao, Zhen
    Li, Zhenjiang
    Wang, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5103 - 5115
  • [32] Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey
    Mbow, Mariama
    Sakurai, Kouichi
    Koide, Hiroshi
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 196 - 212
  • [33] Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
    Li, Deqiang
    Li, Qianmu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3886 - 3900
  • [34] Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey
    Wang, Yulong
    Sun, Tong
    Li, Shenghong
    Yuan, Xin
    Ni, Wei
    Hossain, Ekram
    Vincent Poor, H.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2245 - 2298
  • [35] Deep Learning-Based Autonomous Driving Systems: A Survey of Attacks and Defenses
    Deng, Yao
    Zhang, Tiehua
    Lou, Guannan
    Zheng, Xi
    Jin, Jiong
    Han, Qing-Long
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (12) : 7897 - 7912
  • [36] Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses
    Tekgul, Buse G. A.
    Wang, Shelly
    Marchal, Samuel
    Asokan, N.
    COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 384 - 404
  • [37] Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks
    Miller, David J.
    Xiang, Zhen
    Kesidis, George
    PROCEEDINGS OF THE IEEE, 2020, 108 (03) : 402 - 433
  • [38] Adversarial Attacks and Defenses Against Deep Learning Under the Cloud-Edge-Terminal Scenes
    Li Q.
    Lin C.
    Yang Y.
    Shen C.
    Fang L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2109 - 2129
  • [39] Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses
    Juraev, Firuz
    Abuhamad, Mohammed
    Chan-Tin, Eric
    Thiruvathukal, George K.
    Abuhmed, Tamer
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [40] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422