Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training

被引:2
作者
Tang, Keke [1 ]
Lou, Tianrui [1 ]
He, Xu [1 ]
Shi, Yawen [1 ]
Zhu, Peican [2 ]
Gu, Zhaoquan [3 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Peoples R China
[3] Harbin Inst Technol Shenzhen, Dept Comp Sci & Technol, Shenzhen 518055, Peoples R China
来源
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT I, KSEM 2023 | 2023年 / 14117卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Adversarial attack; Adversarial training; Adversarial defense; Adversarial example; Anomaly;
D O I
10.1007/978-3-031-40283-8_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial training (AT) is one of the most promising solutions for defending adversarial attacks. By exploiting the adversarial examples generated in the maximization step of AT, a large improvement on the robustness can be brought. However, by analyzing the original natural examples and the corresponding adversarial examples, we observe that a certain part of them are abnormal. In this paper, we propose a novel AT framework called anomaly-aware adversarial training (A3T), which utilizes different learning strategies for handling the one normal case and two abnormal cases of generating adversarial examples. Extensive experiments on three publicly available datasets with classifiers in three major network architectures demonstrate that A3T is effective in robustifying networks to adversarial attacks in both white/black-box settings and outperforms the state-of-the-art AT methods.
引用
收藏
页码:328 / 342
页数:15
相关论文
共 36 条
[1]  
[Anonymous], 2019, ICLR (Poster)
[2]  
Athalye A, 2018, PR MACH LEARN RES, V80
[3]  
Cai QZ, 2018, PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P3740
[4]  
Croce F, 2020, PR MACH LEARN RES, V119
[5]  
Goodfellow I., 2015, 2015 INT C LEARN REP
[6]   A survey of deep learning techniques for autonomous driving [J].
Grigorescu, Sorin ;
Trasnea, Bogdan ;
Cocias, Tiberiu ;
Macesanu, Gigel .
JOURNAL OF FIELD ROBOTICS, 2020, 37 (03) :362-386
[7]  
Guo Chong, 2018, 2018 INT C MIR MILL
[8]   ADS-detector: An attention-based dual stream adversarial example detection method [J].
Guo, Sensen ;
Li, Xiaoyu ;
Zhu, Peican ;
Mu, Zhiying .
KNOWLEDGE-BASED SYSTEMS, 2023, 265
[9]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[10]   GM-Attack: Improving the Transferability of Adversarial Attacks [J].
Hong, Jinbang ;
Tang, Keke ;
Gao, Chao ;
Wang, Songxin ;
Guo, Sensen ;
Zhu, Peican .
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2022, PT III, 2022, 13370 :489-500