In this chapter, we looked at the attack and defense techniques that exploit the adversarial examples created with GANs.
We looked at the concrete threats that can arise from the use of GANs against DNNs that are increasingly at the heart of cybersecurity procedures, such as malware-detection tools, and biometric authentication. In addition to the risks associated with the widespread use of NNs in the management of sensitive data, such as health data, these threats lead to new forms of GAN-based attacks that can compromise even the health and physical safety of citizens.
In the next chapter, we will learn how to evaluate algorithms with the help of several examples.