An In-Depth Exploration of Adversarial Attacks on Deep Learning Models: Techniques, Implications, and Mitigation Strategies

Main Article Content

Huy Tran
Amira Binti

Abstract

Adversarial attacks have emerged as a critical threat to the integrity and reliability of deep learning models, which are extensively used in various high-stakes applications such as image recognition, autonomous driving, and cybersecurity. This paper delves into the advanced techniques employed in adversarial attacks on deep learning models, examines the implications of these attacks on system performance and security, and evaluates various mitigation strategies designed to counter these threats. By exploring sophisticated attack methods, including gradient-based and optimization-based approaches, we highlight the vulnerabilities of deep learning models. The study also discusses the broader implications of these attacks, from compromised model accuracy to potential exploitation in malicious activities. Furthermore, we assess the effectiveness of different defense mechanisms, such as adversarial training, input preprocessing, and robust model architectures, in mitigating these risks. Our findings emphasize the necessity of ongoing research and innovation in adversarial defense to safeguard the robustness and reliability of deep learning applications in adversarial environments. This comprehensive analysis aims to provide insights into current defense strategies and inspire further advancements in this crucial area of study.

Article Details

How to Cite
Tran, H., & Binti, A. (2023). An In-Depth Exploration of Adversarial Attacks on Deep Learning Models: Techniques, Implications, and Mitigation Strategies. International Journal of Human-Centered Emerging Technologies, 13(11), 1–10. Retrieved from https://scicadence.com/index.php/IJHET/article/view/56
Section
Articles
Author Biographies

Huy Tran, Computer Science Department, University of Hue, Vietnam

Huy Tran, Computer Science Department, University of Hue, Vietnam

 

Amira Binti, Computer Science Department, Universiti Malaya, Malaysia

Amira Binti, Computer Science Department, Universiti Malaya, Malaysia