Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Table 1

Comparison of attacking techniques against Deep Learning.

Attacking techniqueAdvantagesDisadvantagesCountermeasure technique

Causative attack [45, 46]Influence on training data and exploits misclassificationsTime consuming[45, 4749]
Not fit for large dataset
Exploratory attack [47]Changes the discriminant resultsResource consuming[5052]
Misclassifies positive sample
Integrity attack [53]False negative passes through the systemEasily detected[5456]
Availability attack [57]False positive results in blocking recordsTime and resource consuming[5860]
Privacy violation attack [61]Easily exploit the training datasetIts performance is not reliable as it based on iterations[6264]
Targeted attack [65]Misclassified to any arbitrary classIt does not provide assurance about the generated samples[6668]
Indiscriminate attack [69]Good trade-offPerturbation is high[70, 71]
Highly efficient