亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Towards Deep Learning: A Review On Adversarial Attacks

对抗制 计算机科学 对抗性机器学习 对手 计算机安全 人工智能 脆弱性(计算) 人气 机器学习 稳健性(进化) 深度学习 互联网隐私 社会心理学 心理学 基因 化学 生物化学
作者
Muhammad Irfan,Sheraz Ali,Irfan Yaqoob,Numan Zafar
出处
期刊:International Conference on Artificial Intelligence
标识
DOI:10.1109/icai52203.2021.9445247
摘要

Attacker determines their targets strategically and deliberately depend on vulnerabilities they have ascertained. Organization and individuals mostly try to protect themselves from one occurrence or type on an attack. Still, they have to acknowledge that the attacker may easily move focus to advanced uncovered vulnerabilities. Even if someone successfully tackles several attacks, risks remain, and the need to face threats will happen for the predictable future. Machine learning algorithms have earned much popularity in artificial intelligence (A.I) in the modern era. Large organizations like Google, Facebook, and Microsoft use large volumes of user data to train machine learning models. Then they use it for social ads. Like these days, Whatsapp will make a new privacy policy to share their data on Facebook. That data may be used for companies advertisements in future. So, in this way, the privacy of an individual might be breech out. Due to the high probability of attacks and the leakage of sensitive data in deep learning on distributive computation, adversarial examples demonstrated the vulnerability of machine learning techniques in terms of robustness. Besides, this allowed adversaries to make use of the vulnerability to target machine learning systems. Although adversarial attacks on real-world applications did not occur until recently, it is difficult to inject an artificial adversary to the model that is being hosted without infringement of the reliability. Recently few attacks occur in terms of facial recognition, road signs classification by finally, the difference between theoretical methodologies for the generation of adversarial examples and practical schemes of attacks on real-world applications. To direct future studies in the real defence of adversarial examples in real-world applications, For realistic attacks, we integrate the threat model with adversarial examples and give an overview with future direction.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
初见完成签到,获得积分20
14秒前
原子超人完成签到,获得积分10
18秒前
自律完成签到,获得积分10
22秒前
火星上向珊完成签到,获得积分10
28秒前
32秒前
满意的伊完成签到,获得积分10
36秒前
幸运的姜姜完成签到 ,获得积分10
36秒前
馆长应助火星上向珊采纳,获得10
43秒前
一盏壶完成签到,获得积分10
1分钟前
Wei发布了新的文献求助10
1分钟前
朴素千亦完成签到,获得积分10
2分钟前
佳佳完成签到,获得积分10
2分钟前
祝愿完成签到 ,获得积分10
2分钟前
2分钟前
刘刘完成签到 ,获得积分10
2分钟前
鲁成危发布了新的文献求助10
2分钟前
fufufu123完成签到 ,获得积分10
3分钟前
3分钟前
Hui发布了新的文献求助20
3分钟前
映寒完成签到,获得积分10
4分钟前
kk发布了新的文献求助10
4分钟前
实验顺顺利利完成签到,获得积分10
4分钟前
CipherSage应助einspringen采纳,获得10
4分钟前
qyh完成签到,获得积分10
4分钟前
4分钟前
科研通AI6应助kk采纳,获得10
4分钟前
einspringen发布了新的文献求助10
4分钟前
einspringen完成签到,获得积分10
4分钟前
朱宣诚完成签到,获得积分10
5分钟前
慕青应助昂帕帕斯采纳,获得10
5分钟前
6分钟前
zxxxx发布了新的文献求助10
6分钟前
量子星尘发布了新的文献求助20
6分钟前
xiaolang2004完成签到,获得积分10
6分钟前
共享精神应助谭希凡采纳,获得10
6分钟前
矢思然完成签到,获得积分10
6分钟前
NexusExplorer应助xiaolang2004采纳,获得10
6分钟前
传奇3应助zzazz采纳,获得10
7分钟前
zxxxx完成签到,获得积分10
7分钟前
冷傲半邪完成签到,获得积分10
8分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Einführung in die Rechtsphilosophie und Rechtstheorie der Gegenwart 1500
Binary Alloy Phase Diagrams, 2nd Edition 1000
青少年心理适应性量表(APAS)使用手册 700
Air Transportation A Global Management Perspective 9th Edition 700
DESIGN GUIDE FOR SHIPBOARD AIRBORNE NOISE CONTROL 600
NMR in Plants and Soils: New Developments in Time-domain NMR and Imaging 600
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 内科学 生物化学 物理 计算机科学 纳米技术 遗传学 基因 复合材料 化学工程 物理化学 病理 催化作用 免疫学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 4984165
求助须知:如何正确求助?哪些是违规求助? 4235156
关于积分的说明 13189743
捐赠科研通 4027665
什么是DOI,文献DOI怎么找? 2203399
邀请新用户注册赠送积分活动 1215546
关于科研通互助平台的介绍 1132845