2019
DOI: 10.3390/app9050909
|View full text |Cite
|
Sign up to set email alerts
|

Review of Artificial Intelligence Adversarial Attack and Defense Technologies

Abstract: In recent years, artificial intelligence technologies have been widely used in computer vision, natural language processing, automatic driving, and other fields. However, artificial intelligence systems are vulnerable to adversarial attacks, which limit the applications of artificial intelligence (AI) technologies in key security fields. Therefore, improving the robustness of AI systems against adversarial attacks has played an increasingly important role in the further development of AI. This paper aims to co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
139
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 284 publications
(173 citation statements)
references
References 50 publications
0
139
0
Order By: Relevance
“…While such explanations are not precise, they are able to draw attention to key drivers emergent in the AI decisionmaking. Similarly "adversarial testing" is an approach whereby people try to "break" an AI or make it make very wrong decisions (Qiu et al, 2019).…”
Section: Technological Innovationsmentioning
confidence: 99%
“…While such explanations are not precise, they are able to draw attention to key drivers emergent in the AI decisionmaking. Similarly "adversarial testing" is an approach whereby people try to "break" an AI or make it make very wrong decisions (Qiu et al, 2019).…”
Section: Technological Innovationsmentioning
confidence: 99%
“…Since then, adversarial attacks and defenses have become an active research field. The readers can refer to (Qiu et al 2019;Yuan et al 2019) for a comprehensive review and we summarize only the works related to adversarial attacks (Akhtar and Mian 2018) in this section. There are different ways to categorize attacks, such as targeted and non-targeted attacks, or white-box and blackbox attacks.…”
Section: Related Workmentioning
confidence: 99%
“…• targeted attack -the adversary changes the output classification of input to the desired one; • untargeted attack -the adversary leads to misclassification of input. In [8], the classification of attacks based on what is known about the neural network is provided. In white-box attacks, parameters of the model, as well as its structure and training procedure, are known.…”
Section: A the Concept Of Adversarial Attacksmentioning
confidence: 99%