2020
DOI: 10.1109/access.2020.2987435
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Security: Threats, Countermeasures, and Evaluations

Abstract: Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close to humans or even beyond humans. However, recent studies show that machine learning models are vulnerable to various attacks, which will compromise the security of the models themselves and the application systems. Moreover, such attacks are stealthy due to the unexplained nat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
48
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 135 publications
(49 citation statements)
references
References 79 publications
0
48
0
1
Order By: Relevance
“…Despite the beginning of machine learning dating back several decades, it is currently considered as an emerging field for developing research processes [32], demonstrating unexpected results in complex situations that resemble processes developed by human experts or superior to them [33].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite the beginning of machine learning dating back several decades, it is currently considered as an emerging field for developing research processes [32], demonstrating unexpected results in complex situations that resemble processes developed by human experts or superior to them [33].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Machine learning generates learning with low computational complexity [34] by which it is possible to extract behavior patterns from a dataset and build predictive models [35] using two phases in data processing: training and testing [33]. Furthermore, the training data requires standardization processes to ensure its efficiency [36].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, even with its unique characteristics, it has various security threats and protection challenges, as discussed in this section [30]. The categorization is performed based on the CIA Triad and attacks on cloud components [31,38].…”
Section: Cloud Threatsmentioning
confidence: 99%
“…A number of literature surveys and reviews on the applications of ML-techniques in image forensics has been published in the literature ( Akhtar and Mian, 2018;Amodei et al, 2016;Papernot et al, 2016c;Xue et al, 2020 ;Ferreira et al, 2020;Kaur and Jindal, 2020;Verdoliva, 2020;Yang et al, 2020 ), although adversarial image forensics is generally not discussed. Amodei et al (2016) , for example, reviewed the general security concerns in artificial intelligence, particularly reinforcement learning and supervised learning algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Amodei et al (2016) , for example, reviewed the general security concerns in artificial intelligence, particularly reinforcement learning and supervised learning algorithms. A general review of security implications on the use of ML approaches and their countermeasures was presented by Papernot et al (2016c) , and Xue et al (2020) . Akhtar and Mian (2018) focused on adversarial attacks on deep learning approaches in computer vision.…”
Section: Introductionmentioning
confidence: 99%