Keywords:-

Keywords: Adversarial attacks, artificial intelligence, model security, machine learning, robustness, adversarial learning , explainable AI, cybersecurity, deep learning , anomaly detection, model encryption, autonomous vehicles, data manipulation, security standardization, system resilience.

Article Content:-

Abstract

Adversarial attacks exploit vulnerabilities in artificial intelligence models to alter their decisions, posing a major threat to critical domains such as cybersecurity, finance, and autonomous vehicles. Although various defense strategies, such as adversarial learning and anomaly detection, have been developed, they remain limited by their lack of generalization and their negative impact on model performance. The constant evolution of attack techniques renders these approaches insufficient, requiring an overhaul of protection strategies to ensure more resilient and secure AI.

To counter these threats, it is essential to design AI models that are more resilient to disruptions by integrating self-correction and adaptive learning mechanisms. Furthermore, securing deployment environments, encrypting models, and auditing queries are essential measures to strengthen their protection. Finally, close collaboration between researchers, industry, and regulators is necessary to establish robust security standards and ensure the reliable and seamless adoption of AI in critical infrastructure.

References:-

References

Biggio , B., & Roli , F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning . Pattern Recognition , 84, 317-331.

https://doi.org/10.1016/j.patcog.2018.07.023

Carlini , N., & Wagner, D. (2017). Towards evaluating the robustness of neural networks . IEEE Symposium on Security and Privacy (S&P) , 39-57. https://doi.org/10.1109/SP.2017.49

Eykholt , K., Evtimov , I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018). Robust physical-world attacks on deep learning models . Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 1625-1634.

https://doi.org/10.1109/CVPR.2018.00175

Goodfellow, I.J., Shlens , J., & Szegedy , C. (2015). Explaining and harnessing adversarial examples . International Conference on Learning

Representations (ICLR) .

https://arxiv.org/abs/1412.6572

Kurakin , A., Goodfellow, I., & Bengio , S. (2017). Adversarial examples in the physical world . International Conference on Learning Representations (ICLR) Workshop Track .

https://arxiv.org/abs/1607.02533

Madry , A., Makelov , A., Schmidt, L., Tsipras, D., & Vladu , A. (2018). Towards deep learning models resistant to adversarial attacks . International Conference on Learning Representations (ICLR) . https://arxiv.org/abs/1706.06083

Moosavi-Dezfooli , SM, Fawzi, A., & Frossard, P. (2016). DeepFool : A simple and accurate method to fool deep neural networks . IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2574-2582. https://doi.org/10.1109/CVPR.2016.282

Papernot , N., McDaniel, P., Goodfellow, I., Jha, S., Celik , ZB, & Swami, A. (2017). Practical black-box attacks against machine learning . Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS'17) , 506-519. https://doi.org/10.1145/3052973.3053009

Rosenberg, M., Shabtai, A., Rokach , L., & Elovici , Y. (2018). Adversarial machine learning attacks and defense methods in the cyber security domain . ACM Computing Surveys (CSUR) , 51(5), 1-36. https://doi.org/10.1145/3230630

Xu, W., Evans, D., & Qi, Y. (2020). Feature squeezing: Detecting adversarial examples in deep neural networks . Network and Distributed System Security Symposium (NDSS) .

https://arxiv.org/abs/1704.01155

Downloads

Citation Tools

How to Cite
MPAMPI, A., KALANDA, R., MUKONKOLE, P., & MBAYO, J. M. (2025). Adversarial Attacks and Vulnerabilities of AI in a Decision-Making System: Issues and Countermeasures. International Journal Of Mathematics And Computer Research, 13(7), 5417-5429. https://doi.org/10.47191/ijmcr/v13i7.11