How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses

被引:9
|
作者
Costa, Joana C. [1 ]
Roxo, Tiago [2 ]
Proenca, Hugo
Inacio, Pedro Ricardo Morais
机构
[1] Univ Beira Interior, Sins Lab, Inst Telecomunicacoes, P-6201001 Covilha, Portugal
[2] Univ Beira Interior, Dept Comp Sci, P-6201001 Covilha, Portugal
关键词
Surveys; Transformers; Perturbation methods; Object recognition; Deep learning; Closed box; Vectors; Adversarial attacks; adversarial defenses; datasets; evaluation metrics; review; vision transformers; RECOGNITION; VISION;
D O I
10.1109/ACCESS.2024.3395118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Learning is currently used to perform multiple tasks, such as object recognition, face recognition, and natural language processing. However, Deep Neural Networks (DNNs) are vulnerable to perturbations that alter the network prediction, named adversarial examples, which raise concerns regarding the usage of DNNs in critical areas, such as Self-driving Vehicles, Malware Detection, and Healthcare. This paper compiles the most recent adversarial attacks in Object Recognition, grouped by the attacker capacity and knowledge, and modern defenses clustered by protection strategies, providing background details to understand the topic of adversarial attacks and defenses. The new advances regarding Vision Transformers are also presented, which have not been previously done in the literature, showing the resemblance and dissimilarity between this architecture and Convolutional Neural Networks. Furthermore, the most used datasets and metrics in adversarial settings are summarized, along with datasets requiring further evaluation, which is another contribution. This survey compares the state-of-the-art results under different attacks for multiple architectures and compiles all the adversarial attacks and defenses with available code, comprising significant contributions to the literature. Finally, practical applications are discussed, and open issues are identified, being a reference for future works.
引用
收藏
页码:61113 / 61136
页数:24
相关论文
共 50 条
  • [21] Adversarial Attacks and Defenses for Deep-Learning-Based Unmanned Aerial Vehicles
    Tian, Jiwei
    Wang, Buhong
    Guo, Rongxiao
    Wang, Zhen
    Cao, Kunrui
    Wang, Xiaodong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22399 - 22409
  • [22] Adversarial attacks and defenses in explainable artificial intelligence: A survey
    Baniecki, Hubert
    Biecek, Przemyslaw
    INFORMATION FUSION, 2024, 107
  • [23] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
    Lan, Jiahe
    Zhang, Rui
    Yan, Zheng
    Wang, Jie
    Chen, Yu
    Hou, Ronghui
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 127
  • [24] When deep learning meets watermarking: A survey of application, attacks and defenses
    Chen, Huajie
    Liu, Chi
    Zhu, Tianqing
    Zhou, Wanlei
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [25] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [26] A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models
    Vazquez-Hernandez, Monserrat
    Morales-Rosales, Luis Alberto
    Algredo-Badillo, Ignacio
    Fernandez-Gregorio, Sofia Isabel
    Rodriguez-Rangel, Hector
    Cordoba-Tlaxcalteco, Maria-Luisa
    APPLIED SCIENCES-BASEL, 2024, 14 (11):
  • [27] Adversarial attacks and defenses for digital communication signals identification
    Tian, Qiao
    Zhang, Sicheng
    Mao, Shiwen
    Lin, Yun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (03) : 756 - 764
  • [28] Defense Against Adversarial Attacks in Deep Learning
    Li, Yuancheng
    Wang, Yimeng
    APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [29] Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
    Li, Jiao
    Liu, Yang
    Chen, Tao
    Xiao, Zhen
    Li, Zhenjiang
    Wang, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5103 - 5115
  • [30] Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey
    Mbow, Mariama
    Sakurai, Kouichi
    Koide, Hiroshi
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 196 - 212