{"title":"Comprehending and Detecting Vulnerabilities using Adversarial Machine Learning Attacks","authors":"Charmee Mehta, Purvi Harniya, Sagar Kamat","doi":"10.1109/AISP53593.2022.9760580","DOIUrl":null,"url":null,"abstract":"In today’s world, machine learning is an emerging technology which is being used extensively in different domains. In order to offer effective solutions in the broad area of computer security with the use of machine learning (ML) models, applications which identify and protect against potential adversarial attacks are employed. In the ever-growing field of adversarial machine learning, attackers with different extents of accessibility to a machine learning model can launch a number of attacks to achieve their goals. Concurrently, ML models and algorithms are quite susceptible to various cybersecurity threats. In this paper, an in-depth survey has been carried out on the impact of cybersecurity in machine learning and the adversarial attacks which can be encountered in a ML based system.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"41 8 Pt 1 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISP53593.2022.9760580","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In today’s world, machine learning is an emerging technology which is being used extensively in different domains. In order to offer effective solutions in the broad area of computer security with the use of machine learning (ML) models, applications which identify and protect against potential adversarial attacks are employed. In the ever-growing field of adversarial machine learning, attackers with different extents of accessibility to a machine learning model can launch a number of attacks to achieve their goals. Concurrently, ML models and algorithms are quite susceptible to various cybersecurity threats. In this paper, an in-depth survey has been carried out on the impact of cybersecurity in machine learning and the adversarial attacks which can be encountered in a ML based system.