Keywords:-
Article Content:-
Abstract
Adversarial attacks exploit vulnerabilities in artificial intelligence models to alter their decisions, posing a major threat to critical domains such as cybersecurity, finance, and autonomous vehicles. Although various defense strategies, such as adversarial learning and anomaly detection, have been developed, they remain limited by their lack of generalization and their negative impact on model performance. The constant evolution of attack techniques renders these approaches insufficient, requiring an overhaul of protection strategies to ensure more resilient and secure AI.
To counter these threats, it is essential to design AI models that are more resilient to disruptions by integrating self-correction and adaptive learning mechanisms. Furthermore, securing deployment environments, encrypting models, and auditing queries are essential measures to strengthen their protection. Finally, close collaboration between researchers, industry, and regulators is necessary to establish robust security standards and ensure the reliable and seamless adoption of AI in critical infrastructure.
References:-
References
Biggio , B., & Roli , F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning . Pattern Recognition , 84, 317-331.
https://doi.org/10.1016/j.patcog.2018.07.023
Carlini , N., & Wagner, D. (2017). Towards evaluating the robustness of neural networks . IEEE Symposium on Security and Privacy (S&P) , 39-57. https://doi.org/10.1109/SP.2017.49
Eykholt , K., Evtimov , I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018). Robust physical-world attacks on deep learning models . Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 1625-1634.
https://doi.org/10.1109/CVPR.2018.00175
Goodfellow, I.J., Shlens , J., & Szegedy , C. (2015). Explaining and harnessing adversarial examples . International Conference on Learning
Representations (ICLR) .
https://arxiv.org/abs/1412.6572
Kurakin , A., Goodfellow, I., & Bengio , S. (2017). Adversarial examples in the physical world . International Conference on Learning Representations (ICLR) Workshop Track .
https://arxiv.org/abs/1607.02533
Madry , A., Makelov , A., Schmidt, L., Tsipras, D., & Vladu , A. (2018). Towards deep learning models resistant to adversarial attacks . International Conference on Learning Representations (ICLR) . https://arxiv.org/abs/1706.06083
Moosavi-Dezfooli , SM, Fawzi, A., & Frossard, P. (2016). DeepFool : A simple and accurate method to fool deep neural networks . IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2574-2582. https://doi.org/10.1109/CVPR.2016.282
Papernot , N., McDaniel, P., Goodfellow, I., Jha, S., Celik , ZB, & Swami, A. (2017). Practical black-box attacks against machine learning . Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS'17) , 506-519. https://doi.org/10.1145/3052973.3053009
Rosenberg, M., Shabtai, A., Rokach , L., & Elovici , Y. (2018). Adversarial machine learning attacks and defense methods in the cyber security domain . ACM Computing Surveys (CSUR) , 51(5), 1-36. https://doi.org/10.1145/3230630
Xu, W., Evans, D., & Qi, Y. (2020). Feature squeezing: Detecting adversarial examples in deep neural networks . Network and Distributed System Security Symposium (NDSS) .