Defense against adversarial examples based on wavelet domain analysis

被引:5
作者
Sarvar, Armaghan [1 ]
Amirmazlaghani, Maryam [1 ]
机构
[1] Amirkabir Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
Deep learning; Adversarial examples; Adversarial detection; Input data reconstruction; Wavelet domain;
D O I
10.1007/s10489-022-03159-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, machine learning and deep learning, in particular, have shown powerful performance on different challenging tasks. However, research has shown that deep learning systems can be vulnerable to malicious inputs modified by perturbations crafted to be imperceptible to humans. These adversarial examples can fool the classifier into misclassifying them with high confidence, limiting the applications of deep learning systems, especially where guaranteeing the security of the learning model is necessary. In this paper, we propose a two-level defense method consisting of adversarial detection and input data reconstruction modules against adversarial attacks. The detector differentiates between normal and adversarial examples fed to a deep image classification model, and the reconstructor transforms the detected adversarial images to their corresponding normal samples. Both detection and reconstruction modules are novel and fast signal processing-based techniques depending on analyzing the attacks in the wavelet domain. We show that our defense method is effective against the most state-of-the-art attacks with neither modifying the protected classifier nor utilizing any deep learning model that could be exposed to attacks itself.
引用
收藏
页码:423 / 439
页数:17
相关论文
共 40 条
  • [1] Alessio C, 2019, ANIMALS 10 DATASET
  • [2] [Anonymous], 2016, A study of the effect of jpg compression on adversarial images
  • [3] Arjovsky M, 2017, PR MACH LEARN RES, V70
  • [4] Armi L, 2019, ARXIV 190406554
  • [5] AI-GAN: ATTACK-INSPIRED GENERATION OF ADVERSARIAL EXAMPLES
    Bai, Tao
    Zhao, Jun
    Zhu, Jinlin
    Han, Shoudong
    Chen, Jiefeng
    Li, Bo
    Kot, Alex
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 2543 - 2547
  • [6] Biggio B., 2013, Lecture Notes in Computer Science, P387, DOI [DOI 10.1007/978-3-642-40994-325, 10.1007/978-3-642-40994-3_25, DOI 10.1007/978-3-642-40994-3_25]
  • [7] Carlini N., 2017, P 10 ACM WORKSH ART, P3, DOI DOI 10.1145/3128572.3140444
  • [8] Carlini N, 2017, ARXIV 171108478
  • [9] Das N, 2017, ARXIV 170502900
  • [10] Dong Y, 2017, ARXIV 171006081