A Survey on Attacks and Their Countermeasures in Deep Learning: Applications in Deep Neural Networks, Federated, Transfer, and Deep Reinforcement Learning

被引:11
作者
Ali, Haider [1 ]
Chen, Dian [1 ]
Harrington, Matthew [1 ]
Salazar, Nathaniel [1 ]
Al Ameedi, Mohannad [1 ]
Khan, Ahmad Faraz [1 ]
Butt, Ali R. [1 ]
Cho, Jin-Hee [1 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
关键词
Attacks; defenses; deep neural networks; federated learning; transfer learning; deep reinforcement learning; 3D ADVERSARIAL ATTACKS; BACKDOOR ATTACKS; FRAMEWORK; DEFENSES; PRIVACY;
D O I
10.1109/ACCESS.2023.3326410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Learning (DL) techniques are being used in various critical applications like self-driving cars. DL techniques such as Deep Neural Networks (DNN), Deep Reinforcement Learning (DRL), Federated Learning (FL), and Transfer Learning (TL) are prone to adversarial attacks, which can make the DL techniques perform poorly. Developing such attacks and their countermeasures is the prerequisite for making artificial intelligence techniques robust, secure, and deployable. Previous survey papers only focused on one or two techniques and are outdated. They do not discuss application domains, datasets, and testbeds in detail. There is also a need to discuss the commonalities and differences among DL techniques. In this paper, we comprehensively discussed the attacks and defenses in four popular DL models, including DNN, DRL, FL, and TL. We also highlighted the application domains, datasets, metrics, and testbeds in these fields. One of our key contributions is to discuss the commonalities and differences among these DL techniques. Insights, lessons, and future research directions are also highlighted in detail.
引用
收藏
页码:120095 / 120130
页数:36
相关论文
共 178 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]   ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning [J].
Ali, Haider ;
Al Ameedi, Mohannad ;
Swami, Ananthram ;
Ning, Rui ;
Li, Jiang ;
Wu, Hongyi ;
Cho, Jin-Hee .
2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, :1-9
[3]  
[Anonymous], 2017, arXiv
[4]  
[Anonymous], 2018, arXiv
[5]  
Bagdasaryan E., 2018, arXiv
[6]  
Bagdasaryan E, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P1505
[7]  
Beaufays F., 2018, CoRR
[8]  
Behzadan Vahid, 2017, Machine Learning and Data Mining in Pattern Recognition. 13th International Conference, MLDM 2017. Proceedings: LNAI 10358, P262, DOI 10.1007/978-3-319-62416-7_19
[9]  
Behzadan V., 2018, arXiv
[10]  
Behzadan V., 2019, arXiv