On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review
The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly. This rapid evolution has made traditional defense systems increasingly ineffective at detecting and mitigating these hidde...
| Published in: | Intelligent Systems with Applications |
|---|---|
| Main Authors: | Noora Al Roken, Hakim Hacid, Ahmed Bouridane, Abir Hussain |
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2025-09-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2667305325000808 |
Similar Items
Breaking and Healing: GAN-Based Adversarial Attacks and Post-Adversarial Recovery for 5G IDSs
by: Yasmeen Alslman, et al.
Published: (2025-01-01)
by: Yasmeen Alslman, et al.
Published: (2025-01-01)
Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach
by: Romina Torres, et al.
Published: (2025-07-01)
by: Romina Torres, et al.
Published: (2025-07-01)
Traffic adversarial example attack and defense method based on explainable artificial intelligence
by: MA Bowen, et al.
Published: (2025-04-01)
by: MA Bowen, et al.
Published: (2025-04-01)
Testing the limits: exploring adversarial techniques in AI models
by: Apostolis Zarras, et al.
Published: (2025-10-01)
by: Apostolis Zarras, et al.
Published: (2025-10-01)
False Data Injection Attacks on Data-Driven Algorithms in Smart Grids Utilizing Distributed Power Supplies
by: Zengji Liu, et al.
Published: (2025-08-01)
by: Zengji Liu, et al.
Published: (2025-08-01)
Explainable Artificial Intelligence with Integrated Gradients for the Detection of Adversarial Attacks on Text Classifiers
by: Harsha Moraliyage, et al.
Published: (2025-01-01)
by: Harsha Moraliyage, et al.
Published: (2025-01-01)
Application of adversarial machine learning in network intrusion detection
by: Qixu LIU, et al.
Published: (2021-11-01)
by: Qixu LIU, et al.
Published: (2021-11-01)
Application of adversarial machine learning in network intrusion detection
by: Qixu LIU, et al.
Published: (2021-11-01)
by: Qixu LIU, et al.
Published: (2021-11-01)
Multitask adversarial attack with dispersion amplification
by: Pavlo Haleta, et al.
Published: (2021-09-01)
by: Pavlo Haleta, et al.
Published: (2021-09-01)
Adversarial attacks and defenses in deep learning
by: Ximeng LIU, et al.
Published: (2020-10-01)
by: Ximeng LIU, et al.
Published: (2020-10-01)
Adversarial attacks and defenses in deep learning
by: LIU Ximeng, et al.
Published: (2020-10-01)
by: LIU Ximeng, et al.
Published: (2020-10-01)
Automated federated learning‐based adversarial attack and defence in industrial control systems
by: Guo‐Qiang Zeng, et al.
Published: (2024-06-01)
by: Guo‐Qiang Zeng, et al.
Published: (2024-06-01)
Review of Artificial Intelligence Adversarial Attack and Defense Technologies
by: Shilin Qiu, et al.
Published: (2019-03-01)
by: Shilin Qiu, et al.
Published: (2019-03-01)
A Defensive Strategy Against Android Adversarial Malware Attacks
by: Fabrice Setephin Atedjio, et al.
Published: (2024-01-01)
by: Fabrice Setephin Atedjio, et al.
Published: (2024-01-01)
RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic
by: Sarah Alkadi, et al.
Published: (2024-04-01)
by: Sarah Alkadi, et al.
Published: (2024-04-01)
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
by: Hassan Khazane, et al.
Published: (2024-01-01)
by: Hassan Khazane, et al.
Published: (2024-01-01)
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects
by: Sabrine Ennaji, et al.
Published: (2025-01-01)
by: Sabrine Ennaji, et al.
Published: (2025-01-01)
Federated Learning with Adversarial Optimisation for Secure and Efficient 5G Edge Computing Networks
by: Saniya Zafar, et al.
Published: (2025-09-01)
by: Saniya Zafar, et al.
Published: (2025-09-01)
Adversarial Attacks to Manipulate Target Localization of Object Detector
by: Kai Xu, et al.
Published: (2024-01-01)
by: Kai Xu, et al.
Published: (2024-01-01)
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
by: Haoran Lyu, et al.
Published: (2024-03-01)
by: Haoran Lyu, et al.
Published: (2024-03-01)
Double adversarial attack against license plate recognition system
by: Xianyi CHEN, et al.
Published: (2023-06-01)
by: Xianyi CHEN, et al.
Published: (2023-06-01)
Double adversarial attack against license plate recognition system
by: Xianyi CHEN, Jun GU1, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU
Published: (2023-06-01)
by: Xianyi CHEN, Jun GU1, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU
Published: (2023-06-01)
Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
by: Khaleel Yahya Layth, et al.
Published: (2024-08-01)
by: Khaleel Yahya Layth, et al.
Published: (2024-08-01)
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
by: João Vitorino, et al.
Published: (2022-03-01)
by: João Vitorino, et al.
Published: (2022-03-01)
On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
by: Sanglee Park, et al.
Published: (2020-11-01)
by: Sanglee Park, et al.
Published: (2020-11-01)
On the adversarial robustness of aerial detection
by: Yuwei Chen, et al.
Published: (2024-11-01)
by: Yuwei Chen, et al.
Published: (2024-11-01)
SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems
by: Sahar Aldhaheri, et al.
Published: (2023-09-01)
by: Sahar Aldhaheri, et al.
Published: (2023-09-01)
Survey on adversarial attacks and defenses for object detection
by: Xinxin WANG, et al.
Published: (2023-11-01)
by: Xinxin WANG, et al.
Published: (2023-11-01)
Survey on adversarial attacks and defenses for object detection
by: Xinxin WANG, et al.
Published: (2023-11-01)
by: Xinxin WANG, et al.
Published: (2023-11-01)
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT
by: Shiming Li, et al.
Published: (2023-02-01)
by: Shiming Li, et al.
Published: (2023-02-01)
Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
by: Afnan Alotaibi, et al.
Published: (2023-01-01)
by: Afnan Alotaibi, et al.
Published: (2023-01-01)
Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks
by: Ren-Hung Hwang, et al.
Published: (2023-01-01)
by: Ren-Hung Hwang, et al.
Published: (2023-01-01)
An Adversarial Attack via Penalty Method
by: Jiyuan Sun, et al.
Published: (2025-01-01)
by: Jiyuan Sun, et al.
Published: (2025-01-01)
An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm
by: Ayyaz Ul Haq Qureshi, et al.
Published: (2020-07-01)
by: Ayyaz Ul Haq Qureshi, et al.
Published: (2020-07-01)
A Hybrid Adversarial Attack for Different Application Scenarios
by: Xiaohu Du, et al.
Published: (2020-05-01)
by: Xiaohu Du, et al.
Published: (2020-05-01)
Point Cloud Adversarial Perturbation Generation for Adversarial Attacks
by: Fengmei He, et al.
Published: (2023-01-01)
by: Fengmei He, et al.
Published: (2023-01-01)
Boosting Adversarial Transferability Through Adversarial Attack Enhancer
by: Wenli Zeng, et al.
Published: (2025-09-01)
by: Wenli Zeng, et al.
Published: (2025-09-01)
Multi-view adversarial attack defending method for host intrusion detection
by: WANG Fei, et al.
Published: (2025-08-01)
by: WANG Fei, et al.
Published: (2025-08-01)
Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation
by: Hiskias Dingeto, et al.
Published: (2023-07-01)
by: Hiskias Dingeto, et al.
Published: (2023-07-01)
Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition
by: Sheeba Lal, et al.
Published: (2021-06-01)
by: Sheeba Lal, et al.
Published: (2021-06-01)
Similar Items
-
Breaking and Healing: GAN-Based Adversarial Attacks and Post-Adversarial Recovery for 5G IDSs
by: Yasmeen Alslman, et al.
Published: (2025-01-01) -
Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach
by: Romina Torres, et al.
Published: (2025-07-01) -
Traffic adversarial example attack and defense method based on explainable artificial intelligence
by: MA Bowen, et al.
Published: (2025-04-01) -
Testing the limits: exploring adversarial techniques in AI models
by: Apostolis Zarras, et al.
Published: (2025-10-01) -
False Data Injection Attacks on Data-Driven Algorithms in Smart Grids Utilizing Distributed Power Supplies
by: Zengji Liu, et al.
Published: (2025-08-01)
