Review Article

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Table 1

Typical attack algorithms for different application domains.

MethodAccess permissionTargeted/nontargetedApplication domainMetrics/strategies

Papernot et al. 2016 [24]White boxNontargetedTextGradient
TextFool 2018 [25]White and black boxTargetedTextGradient
HotFlip 2018 [26]White boxNontargetedTextGradient
Alzantot et al. 2018 [27]Black boxTargetedTextEuclidean distance
DeepWordBug 2018 [28]Black boxNontargetedTextScoring function
Zhao et al. 2018 [29]Black boxNontargetedText and imageWGAN-based
TextBugger 2019 [30]White and black boxNontargetedTextConfidence coefficient, scoring function
DISTFLIP 2019 [31]Black boxNontargetedTextGradient
UPSET 2011 [32]Black boxTargetedUniversal
L-BFGS 2014 [33]White and black boxTargetedImage
FGSM-based 2015 [34]White boxTargeted/nontargetedUniversal,
JSMA 2015 [35]White boxTargetedImage
DeepFool 2016 [36]White boxNontargetedImage,
BIM and ILCM 2017 [37]White boxNontargetedImage
One-pixel 2017 [38]Black boxTargetedImage
C&W 2017 [39]White boxNontargetedImage,,
Universal perturbations 2017 [40]White boxNontargetedUniversal,
ANGRI 2017 [41]Black boxTargetedImage
Houdini 2017 [42]Black boxTargetedImage,
ATNs 2017 [43]White boxTargetedImage
MalGAN 2017 [44]Black boxTargetedMalwareGAN-based, gradient
SLEIPNIR 2018 [45]White boxTargetedMalwareSaddle-point optimization
Kolosnjaji et al. 2018 [46]White boxTargetedMalwareGradient
Song et al. 2020 [47]Black boxTargetedMalwareNumber of bytes changed
Rosenberg et al. 2020 [48]Black boxTargetedMalwareAPI call-based, GAN
MalRNN 2020 [49]Black boxTargetedMalwareVarying the append size