Two-Stream Architecture as a Defense against Adversarial Example

被引:0
|
作者
Hao Ge [1 ]
Xiao-Guang Tu [1 ]
Mei Xie [2 ]
Zheng Ma [1 ]
机构
[1] School of Information and Communication Engineering, University of Electronic Science and Technology of China
[2] School of Electronic Science and Engineering, University of Electronic Science and Technology of China
关键词
D O I
暂无
中图分类号
TP183 [人工神经网络与计算]; TP391.41 [];
学科分类号
080203 ; 081104 ; 0812 ; 0835 ; 1405 ;
摘要
The performance of deep learning on many tasks has been impressive. However, recent studies have shown that deep learning systems are vulnerable to small specifically crafted perturbations imperceptible to humans.Images with such perturbations are called adversarial examples. They have been proven to be an indisputable threat to deep neural networks(DNNs) based applications, but DNNs have yet to be fully elucidated, consequently preventing the development of efficient defenses against adversarial examples. This study proposes a two-stream architecture to protect convolutional neural networks(CNNs) from attacks by adversarial examples. Our model applies the idea of “two-stream” used in the security field. Thus, it successfully defends different kinds of attack methods because of differences in “high-resolution” and “low-resolution” networks in feature extraction. This study experimentally demonstrates that our two-stream architecture is difficult to be defeated with state-of-the-art attacks.Our two-stream architecture is also robust to adversarial examples built by currently known attacking algorithms.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [41] TS-MDA: two-stream multiscale deep architecture for crowd behavior prediction
    Tripathy, Santosh Kumar
    Kostha, Harsh
    Srivastava, Rajeev
    MULTIMEDIA SYSTEMS, 2023, 29 (01) : 15 - 31
  • [42] Two-Stream Spatial-Temporal Auto-Encoder With Adversarial Training for Video Anomaly Detection
    Guo, Biao
    Liu, Mingrui
    He, Qian
    Jiang, Ming
    IEEE ACCESS, 2024, 12 : 125881 - 125889
  • [43] Two-Stream Deep Encoder-Decoder Architecture for Fully Automatic Video Object Segmentation
    Xu, Jingwei
    Song, Li
    Xie, Rong
    2017 IEEE VISUAL COMMUNICATIONS AND IMAGE PROCESSING (VCIP), 2017,
  • [44] A novel two-stream saliency image fusion CNN architecture for person re-identification
    Fuqing Zhu
    Xiangwei Kong
    Haiyan Fu
    Qi Tian
    Multimedia Systems, 2018, 24 : 569 - 582
  • [45] A novel two-stream saliency image fusion CNN architecture for person re-identification
    Zhu, Fuqing
    Kong, Xiangwei
    Fu, Haiyan
    Tian, Qi
    MULTIMEDIA SYSTEMS, 2018, 24 (05) : 569 - 582
  • [46] An Adversarial Example Defense Algorithm for Intelligent Driving
    Lu, Jiazhong
    Wang, Chenli
    Huang, Yuanyuan
    Ding, Kangyi
    Liu, Xiaolei
    IEEE NETWORK, 2024, 38 (06): : 98 - 105
  • [47] Adversarial example defense based on image reconstruction
    Zhang, Yu
    Xu, Huan
    Pei, Chengfei
    Yang, Gaoming
    PEERJ COMPUTER SCIENCE, 2021, 7
  • [48] Effect of two-stream instability on the saturation mechanism of a two-stream free-electron laser with a helical wiggler pump
    Mandizadeh, N.
    Aghamir, Farzin M.
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 2012, 688 : 51 - 54
  • [49] Text Adversarial Purification as Defense against Adversarial Attacks
    Li, Linyang
    Song, Demin
    Qiu, Xipeng
    PROCEEDINGS OF THE 61ST ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, VOL 1, 2023, : 338 - 350
  • [50] Two-stream analysis of a random gain medium
    Selden, AC
    JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS, 2000, 2 (06): : 510 - 514