Review Article

A Survey on Adversarial Attack in the Age of Artificial Intelligence

Table 5

AI security defense technology.

TypePhase
Data collection phaseModel train phaseModel usage phase

Evasive attackGenerating adversarial examplesNetwork distillation; adversarial trainingAdversarial examples detection; input reconstruction; DNN model validation
Poisoning attackFiltering training data; regression analysisIntegration analysis
Back door attackModel pruningInput preprocessing
Model-stealing attackDifferential privacyPrivacy aggregation teacher model; model watermarking