Skip to main navigation Skip to search Skip to main content

Detection of Adversarial Evasion Attack on AI Model Running on IoT Devices

  • Fatimah Alaliwat*
  • , Lena Alqahtani
  • , Manar Alzahrani
  • , Nouf Alamoudi
  • , Shaima Hakami
  • , Abdulrahman Alharby
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The attack surface of adversarial is expanding with the wider application of AI-driven IoT devices. It is thus very crucial to research and come up with defense mechanisms. This paper will cover an evasion attack in which the attacker tampers with input and sends the input to bypass detection instead of manipulating the model itself. It provides the unauthorized capacity to carry out data transmission without being detected. We cover the types of adversarial attacks, bring to light the security risks in AI models, and provide a critical examination of existing detection solutions for evasion attacks. Gap analysis is also provided for the revelation of deficiencies in current methods.

Original languageEnglish
Title of host publicationProceeding - 12th International Conference on Information Technology
Subtitle of host publicationInnovation Technologies, ICIT 2025
EditorsKhalid Mohammad Jaber
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages47-54
Number of pages8
ISBN (Electronic)9798331508944
DOIs
StatePublished - 2025
Event12th International Scientific Conference on Information Technology, ICIT 2025 - Amman, Jordan
Duration: 27 May 202530 May 2025

Publication series

NameProceeding - 12th International Conference on Information Technology: Innovation Technologies, ICIT 2025

Conference

Conference12th International Scientific Conference on Information Technology, ICIT 2025
Country/TerritoryJordan
CityAmman
Period27/05/2530/05/25

Fingerprint

Dive into the research topics of 'Detection of Adversarial Evasion Attack on AI Model Running on IoT Devices'. Together they form a unique fingerprint.

Cite this