ROBUST AND RESILIENT DEEP LEARNING MODELS AGAINST DATA POISONING AND EVASION ATTACKS
Downloads
Objective : This paper will focus on how deep learning models can be robust and resilient to such adversarial manipulations. Method : It gives a detailed insight into widely used poisoning and evasion attack techniques, evaluates their effect on model performance and reliability, and examines the available defense mechanisms that have been used to identify, foil, or counter these attacks. Results : The research paper also addresses the strong training strategies, anomaly identification approaches, and robust model architectures that make it more resistant to adversarial behavior. Novelty : Through the synthesis of the latest progress, the article will help in the creation of safe, trustful, and stable deep learning systems that can be used in the adversarial world with reliability.
K. S. A. Mamun, M. S. Soumik, M. M. Rahman, M. Sarkar, C. A. Abdullah, M. Ali, and M. S. Hossain, “Predictive analytics for insider threats using multimodal data (Log + Behavioural + physical security),” American Journal of Interdisciplinary Research and Innovation, vol. 4, no. 3, pp. 82–90, 2025, doi: 10.54536/ajiri.v4i3.6224.
M. S. Soumik, “Leveraging artificial intelligence and predictive data analytics to enhance cybersecurity and safeguard patient privacy in U.S. electronic health records,” Zenodo, 2025, doi: 10.5281/zenodo.17831805.
K. N. I. Ara, T. Mithila, M. M. A. Rony, and M. Sarkar, “Engineering of AI-powered cyber defense tools to protect immigration databases, biometric identity systems, and border-control infrastructure from nation-state attacks,” Journal of Computer Science and Information Technology, vol. 2, no. 2, pp. 47–58, 2025, doi: 10.61424/jcsit.v2i2.573.
P. Mishra, “Design of intelligent healthcare IT infrastructure using graph theory, network analysis, and artificial intelligence,” International Journal of Applied Mathematics, vol. 38, no. 12S, pp. 2267–2280, 2025, doi: 10.12732/ijam.v38i12s.1547.
Md. Mukidur Rahman, M. S. Soumik, Md. S. Farids, C. A. Abdullah, B. Sutrudhar, M. Ali, and Md. S. Hossain, “Explainable anomaly detection in encrypted network traffic using data analytics,” Journal of Computer Science and Technology Studies, vol. 6, no. 1, pp. 272–281, 2024, doi: 10.32996/jcsts.2024.6.1.31.
Md. M. A. Rony, Md. S. Soumik, and F. Akter, “Applying artificial intelligence to improve early detection and containment of infectious disease outbreaks, supporting national public health preparedness,” Journal of Medical and Health Studies, vol. 4, no. 3, pp. 82–93, 2023, doi: 10.32996/jmhs.2023.4.3.12.
M. S. Soumik, K. S. A. Mamun, S. Omim, H. A. Khan, and M. Sarkar, “Dynamic risk scoring of third-party data feeds and APIs for cyber threat intelligence,” Journal of Computer Science and Technology Studies, vol. 6, no. 1, pp. 282–292, 2024, doi: 10.32996/jcsts.2024.6.1.32.
“Development of AI-driven machine learning systems for real-time detection and automatic mitigation of advanced cyber threats across critical infrastructure,” Frontiers in Computer Science and Artificial Intelligence, vol. 4, no. 2, pp. 26–35, 2025, doi: 10.32996/fcsai.2025.4.2.3.
M. S. Soumik, M. Sarkar, and M. M. Rahman, “Fraud detection and personalized recommendations on synthetic e-commerce data with ML,” Research Journal in Business and Economics, vol. 1, no. 1A, pp. 15–29, 2021, doi: 10.61424/rjbe.v1i1.488.
Md. A. Rahaman, S. Rahman, M. Sarkar, Md. M. Khan, M. M. R. Khan, and Md. M. A. Rony, “Artificial intelligence and machine learning approaches for managing complex project in dynamic environments,” Journal of Computer Science and Technology Studies, vol. 6, no. 2, pp. 225–235, 2024, doi: 10.32996/jcsts.2024.6.2.24.
D. K. R. Toushi, Md. A. Rahaman, S. Rahman, Md. M. A. Rony, and M. Sarkar, “A data-driven approach to enhancing project management efficiency through machine learning and predictive modeling,” Journal of Business and Management Studies, vol. 5, no. 5, pp. 282–292, 2023.
Md. T. Siddique, M. K. Hussain, M. S. Soumik, and M. S. Sristy, “Developing quantum-enhanced privacy-preserving artificial intelligence frameworks based on physical principles to protect sensitive government and healthcare data from foreign cyber threats,” British Journal of Physics Studies, vol. 1, no. 1, pp. 46–58, 2023, doi: 10.32996/bjps.2023.1.1.7.
I. Udoidiok, F. Li, and J. Zhang, "Evaluating Model Resilience to Data Poisoning Attacks: A Comparative Study," Information, vol. 17, no. 1, p. 9, 2026. [Online]. Available: https://doi.org/10.3390/info17010009. [Accessed: 10-Feb-2026].
N. Allheeib, "Securing Machine Learning Against Data Poisoning Attacks," International Journal of Data Warehousing and Mining, vol. 20, no. 1, 2024. [Online]. Available: https://www.sciencedirect.com/org/science/article/pii/S1548392424000144. [Accessed: 10-Feb-2026].
P. Zhao, W. Zhu, and P. Jiao, "Data Poisoning in Deep Learning: A Survey," Preprint arXiv 2503.22759, 2025. [Online]. Available: https://arxiv.org/html/2503.22759v1. [Accessed: 10-Feb-2026].
Copyright (c) 2026 Tonoy Kanti Chowdhury, K M Mohi uddin

This work is licensed under a Creative Commons Attribution 4.0 International License.














