Emerging challenges and perspectives in Deep Learning model security: A brief survey

被引:13
作者
Caviglione, L. [1 ]
Comito, C. [2 ]
Guarascio, M. [2 ]
Manco, G. [2 ]
机构
[1] CNR, IMATI, Inst Appl Math & Informat Technol, Via Marini 6, I-16149 Genoa, Italy
[2] Inst High Performance Comp & Networking ICAR CNR, Via P Bucci, I-87036 Arcavacata Di Rende, CS, Italy
来源
SYSTEMS AND SOFT COMPUTING | 2023年 / 5卷
关键词
Neural network fingerprinting; Neural network watermarking; Data poisoning; Adversarial examples; Fairness;
D O I
10.1016/j.sasc.2023.200050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The widespread adoption of Artificial Intelligence and Machine Learning tools opens to security issues that can raise and occur when the underlying ML models integrated into advanced services. The models, in fact, can be compromised in both the learning and the deployment stage. In this work, we provide an overview of some strenuous security risks and concerns that can affect such models. Our focus is on the research challenges and defense opportunities of the underlying ML framework, when it is devised in specific contexts that can compromise its effectiveness. Specifically, the survey provides an overview of the following emerging topics: Model Watermarking, Information Hiding issues and defense opportunities, Adversarial Learning and model robustness, and Fairness-aware models.
引用
收藏
页数:7
相关论文
共 58 条
[1]   Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding [J].
Abdelnabi, Sahar ;
Fritz, Mario .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :121-140
[2]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[3]  
Anand A., 2021, ACM Trans. Multimedia Comput. Commun. Appl
[4]   Harris Hawks optimisation with Simulated Annealing as a deep feature selection method for screening of COVID-19 CT-scans [J].
Bandyopadhyay, Rajarshi ;
Basu, Arpan ;
Cuevas, Erik ;
Sarkar, Ram .
APPLIED SOFT COMPUTING, 2021, 111
[5]   COVID-19 detection from CT scans using a two-stage framework [J].
Basu, Arpan ;
Sheikh, Khalid Hassan ;
Cuevas, Erik ;
Sarkar, Ram .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 193
[6]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[7]  
Burkart N, 2021, J ARTIF INTELL RES, V70, P245
[8]   The New Threats of Information Hiding The Road Ahead [J].
Cabaj, Krzysztof ;
Caviglione, Luca ;
Mazurczyk, Wojciech ;
Wendzel, Steffen ;
Woodward, Alan ;
Zander, Sebastian .
IT PROFESSIONAL, 2018, 20 (03) :31-39
[9]   Out-of-Band Covert Channels-A Survey [J].
Carrara, Brent ;
Adams, Carlisle .
ACM COMPUTING SURVEYS, 2016, 49 (02)
[10]   Never Mind the Malware, Here's the Stegomalware [J].
Caviglione, Luca ;
Mazurczyk, Wojciech .
IEEE SECURITY & PRIVACY, 2022, 20 (05) :101-106