Wild patterns: Ten years after the rise of adversarial machine learning

被引:706
|
作者
Biggio, Battista [1 ,2 ]
Roli, Fabio [1 ,2 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, Cagliari, Italy
[2] Pluribus One, Cagliari, Italy
基金
欧盟地平线“2020”;
关键词
Adversarial machine learning; Evasion attacks; Poisoning attacks; Adversarial examples; Secure learning; Deep learning; SECURITY; CLASSIFIERS; ROBUSTNESS; ATTACKS; CLASSIFICATION; DEFENSES;
D O I
10.1016/j.patcog.2018.07.023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Learning-based pattern classifiers, including deep networks, have shown impressive performance in several application domains, ranging from computer vision to cybersecurity. However, it has also been shown that adversarial input perturbations carefully crafted either at training or at test time can easily subvert their predictions. The vulnerability of machine learning to such wild patterns (also referred to as adversarial examples), along with the design of suitable countermeasures, have been investigated in the research field of adversarial machine learning. In this work, we provide a thorough overview of the evolution of this research area over the last ten years and beyond, starting from pioneering, earlier work on the security of non-deep learning algorithms up to more recent work aimed to understand the security properties of deep learning algorithms, in the context of computer vision and cybersecurity tasks. We report interesting connections between these apparently-different lines of work, highlighting common misconceptions related to the security evaluation of machine-learning algorithms. We review the main threat models and attacks defined to this end, and discuss the main limitations of current work, along with the corresponding future challenges towards the design of more secure learning algorithms. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:317 / 331
页数:15
相关论文
共 50 条
  • [1] Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Half-day Tutorial
    Biggio, Battista
    Roli, Fabio
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2154 - 2156
  • [2] Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    ACM COMPUTING SURVEYS, 2021, 54 (05)
  • [3] Adversarial Machine Learning: A Multilayer Review of the State-of-the-Art and Challenges for Wireless and Mobile Systems
    Liu, Jinxin
    Nogueira, Michele
    Fernandes, Johan
    Kantarci, Burak
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01): : 123 - 159
  • [4] Defense strategies for Adversarial Machine Learning: A survey
    Bountakas, Panagiotis
    Zarras, Apostolis
    Lekidis, Alexios
    Xenakis, Christos
    COMPUTER SCIENCE REVIEW, 2023, 49
  • [5] Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
    Adesina, Damilola
    Hsieh, Chung-Chu
    Sagduyu, Yalin E.
    Qian, Lijun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 77 - 100
  • [6] On the Economics of Adversarial Machine Learning
    Merkle, Florian
    Samsinger, Maximilian
    Schottle, Pascal
    Pevny, Tomas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4670 - 4685
  • [7] Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward
    Qayyum, Adnan
    Usama, Muhammad
    Qadir, Junaid
    Al-Fuqaha, Ala
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02): : 998 - 1026
  • [8] A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
    Khazane, Hassan
    Ridouani, Mohammed
    Salahdine, Fatima
    Kaabouch, Naima
    FUTURE INTERNET, 2024, 16 (01)
  • [9] Adversarial machine learning in IoT from an insider point of view
    Aloraini, Fatimah
    Javed, Amir
    Rana, Omer
    Burnap, Pete
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [10] A Survey of Adversarial Machine Learning in Cyber Warfare
    Duddu, Vasisht
    DEFENCE SCIENCE JOURNAL, 2018, 68 (04) : 356 - 366