Review Article
A Survey on Adversarial Attack in the Age of Artificial Intelligence
Table 5
AI security defense technology.
| Type | Phase | Data collection phase | Model train phase | Model usage phase |
| Evasive attack | Generating adversarial examples | Network distillation; adversarial training | Adversarial examples detection; input reconstruction; DNN model validation | Poisoning attack | Filtering training data; regression analysis | Integration analysis | | Back door attack | | Model pruning | Input preprocessing | Model-stealing attack | Differential privacy | Privacy aggregation teacher model; model watermarking | |
|
|