TY - EJOU AU - Chen, Kai AU - Wang, Jinwei AU - Zhang, Jiawei TI - An Overview of Adversarial Attacks and Defenses T2 - Journal of Information Hiding and Privacy Protection PY - 2022 VL - 4 IS - 1 SN - 2637-4226 AB - In recent years, machine learning has become more and more popular, especially the continuous development of deep learning technology, which has brought great revolutions to many fields. In tasks such as image classification, natural language processing, information hiding, multimedia synthesis, and so on, the performance of deep learning has far exceeded the traditional algorithms. However, researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks, the model is vulnerable to the example which is modified artificially. This technology is called adversarial attacks, while the examples are called adversarial examples. The existence of adversarial attacks poses a great threat to the security of the neural network. Based on the brief introduction of the concept and causes of adversarial example, this paper analyzes the main ideas of adversarial attacks, studies the representative classical adversarial attack methods and the detection and defense methods. KW - Deep learning; adversarial example; adversarial attacks; adversarial defenses DO - 10.32604/jihpp.2022.029006