TY - JOUR
T1 - A Review of Adversarial Attack and Defense for Classification Methods
AU - Li, Yao
AU - Cheng, Minhao
AU - Hsieh, Cho Jui
AU - Lee, Thomas C.M.
N1 - Publisher Copyright:
© 2022 American Statistical Association.
PY - 2022
Y1 - 2022
N2 - Despite the efficiency and scalability of machine learning systems, recent studies have demonstrated that many classification methods, especially Deep Neural Networks (DNNs), are vulnerable to adversarial examples; that is, examples that are carefully crafted to fool a well-trained classification model while being indistinguishable from natural data to human. This makes it potentially unsafe to apply DNNs or related methods in security-critical areas. Since this issue was first identified by Biggio et al. and Szegedy et al., much work has been done in this field, including the development of attack methods to generate adversarial examples and the construction of defense techniques to guard against such examples. This article aims to introduce this topic and its latest developments to the statistical community, primarily focusing on the generation and guarding of adversarial examples. Computing codes (in Python and R) used in the numerical experiments are publicly available for readers to explore the surveyed methods. It is the hope of the authors that this article will encourage more statisticians to work on this important and exciting field of generating and defending against adversarial examples.
AB - Despite the efficiency and scalability of machine learning systems, recent studies have demonstrated that many classification methods, especially Deep Neural Networks (DNNs), are vulnerable to adversarial examples; that is, examples that are carefully crafted to fool a well-trained classification model while being indistinguishable from natural data to human. This makes it potentially unsafe to apply DNNs or related methods in security-critical areas. Since this issue was first identified by Biggio et al. and Szegedy et al., much work has been done in this field, including the development of attack methods to generate adversarial examples and the construction of defense techniques to guard against such examples. This article aims to introduce this topic and its latest developments to the statistical community, primarily focusing on the generation and guarding of adversarial examples. Computing codes (in Python and R) used in the numerical experiments are publicly available for readers to explore the surveyed methods. It is the hope of the authors that this article will encourage more statisticians to work on this important and exciting field of generating and defending against adversarial examples.
UR - http://www.scopus.com/inward/record.url?scp=85122235792&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85122235792&partnerID=8YFLogxK
U2 - 10.1080/00031305.2021.2006781
DO - 10.1080/00031305.2021.2006781
M3 - Article
AN - SCOPUS:85122235792
SN - 0003-1305
VL - 76
SP - 329
EP - 345
JO - American Statistician
JF - American Statistician
IS - 4
ER -