Towards Security Threats of Deep Learning Systems: A Survey
نویسندگان
چکیده
Deep learning has gained tremendous success and great popularity in the past few years. However, deep systems are suffering several inherent weaknesses, which can threaten security of models. learning’s wide use further magnifies impact consequences. To this end, lots research been conducted with purpose exhaustively identifying intrinsic weaknesses subsequently proposing feasible mitigation. Yet clear about how these incurred effective attack approaches assaulting learning. In order to unveil aid development a robust system, we undertake an investigation on attacks towards learning, analyze conclude some findings multiple views. particular, focus four types associated threats learning: model extraction attack, inversion poisoning adversarial attack. For each type construct its essential workflow as well adversary capabilities goals. Pivot metrics devised for comparing approaches, by perform quantitative qualitative analyses. From analysis, have identified significant indispensable factors vector, e.g., reduce queries target models, what distance should be used measuring perturbation. We shed light 18 covering approaches’ merits demerits, probability, deployment complexity prospects. Moreover, discuss other potential possible mitigation inspire relevant area.
منابع مشابه
Towards Bayesian Deep Learning: A Survey
While perception tasks such as visual object recognition and text understanding play an important role in human intelligence, the subsequent tasks that involve inference, reasoning and planning require an even higher level of intelligence. The past few years have seen major advances in many perception tasks using deep learning models. For higher-level inference, however, probabilistic graphical...
متن کاملRFID Systems: A Survey on Security Threats and Proposed Solutions
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technology in history. This can have huge security implications. The present article surveys the most important technical security challenges of RFID systems. We first provide a brief summary of the most relevant standards related to this technology. ...
متن کاملA survey of WiMAX security threats
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and...
متن کاملDeep learning-based CAD systems for mammography: A review article
Breast cancer is one of the most common types of cancer in women. Screening mammography is a low‑dose X‑ray examination of breasts, which is conducted to detect breast cancer at early stages when the cancerous tumor is too small to be felt as a lump. Screening mammography is conducted for women with no symptoms of breast cancer, for early detection of cancer when the cancer is most treatable an...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 2022
ISSN: ['0098-5589', '1939-3520', '2326-3881']
DOI: https://doi.org/10.1109/tse.2020.3034721