Stylized Adversarial Defense

被引:3
|
作者
Naseer, Muzammal [1 ,2 ]
Khan, Salman [1 ,2 ]
Hayat, Munawar [3 ]
Khan, Fahad Shahbaz [1 ,4 ,5 ]
Porikli, Fatih [6 ]
机构
[1] Mohamed bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
[2] Australian Natl Univ, Canberra, ACT 2601, Australia
[3] Monash Univ, Clayton, Vic 3800, Australia
[4] Mohamed bin Zayed Univ Artificial Intelligence, Masdar, Abu Dhabi, U Arab Emirates
[5] Linkoping Univ, S-58183 Linkoping, Sweden
[6] Qualcomm, San Diego, CA 92121 USA
关键词
Training; Perturbation methods; Robustness; Multitasking; Predictive models; Computational modeling; Visualization; Adversarial training; style transfer; max-margin learning; adversarial attacks; multi-task objective;
D O I
10.1109/TPAMI.2022.3207917
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep Convolution Neural Networks (CNNs) can easily be fooled by subtle, imperceptible changes to the input images. To address this vulnerability, adversarial training creates perturbation patterns and includes them in the training set to robustify the model. In contrast to existing adversarial training methods that only use class-boundary information (e.g., using a cross-entropy loss), we propose to exploit additional information from the feature space to craft stronger adversaries that are in turn used to learn a robust model. Specifically, we use the style and content information of the target sample from another class, alongside its class-boundary information to create adversarial perturbations. We apply our proposed multi-task objective in a deeply supervised manner, extracting multi-scale feature knowledge to create maximally separating adversaries. Subsequently, we propose a max-margin adversarial training approach that minimizes the distance between source image and its adversary and maximizes the distance between the adversary and the target image. Our adversarial training approach demonstrates strong robustness compared to state-of-the-art defenses, generalizes well to naturally occurring corruptions and data distributional shifts, and retains the model's accuracy on clean examples.
引用
收藏
页码:6403 / 6414
页数:12
相关论文
共 50 条
  • [1] Defense Against Adversarial Attacks by Reconstructing Images
    Zhang, Shudong
    Gao, Haichang
    Rao, Qingxun
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 : 6117 - 6129
  • [2] Image Super-Resolution as a Defense Against Adversarial Attacks
    Mustafa, Aamir
    Khan, Salman H.
    Hayat, Munawar
    Shen, Jianbing
    Shao, Ling
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 1711 - 1724
  • [3] Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns
    Lee, Hong Joo
    Ro, Yong Man
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4110 - 4121
  • [4] Adversarial Defense on Harmony: Reverse Attack for Robust AI Models Against Adversarial Attacks
    Kim, Yebon
    Jung, Jinhyo
    Kim, Hyunjun
    So, Hwisoo
    Ko, Yohan
    Shrivastava, Aviral
    Lee, Kyoungwoo
    Hwang, Uiwon
    IEEE ACCESS, 2024, 12 : 176485 - 176497
  • [5] Adversarial Attack and Defense in Deep Ranking
    Zhou, Mo
    Wang, Le
    Niu, Zhenxing
    Zhang, Qilin
    Zheng, Nanning
    Hua, Gang
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (08) : 5306 - 5324
  • [6] Robust Generative Adaptation Network for Open-Set Adversarial Defense
    Li, Yanchun
    Huang, Long
    Tian, Shujuan
    Liu, Haolin
    Li, Zhetao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1649 - 1664
  • [7] Memristive Crossbar Array-Based Adversarial Defense Using Compression
    Paudel, Bijay Raj
    Tragoudas, Spyros
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (03) : 864 - 877
  • [8] Multi-Task Learning With Self-Defined Tasks for Adversarial Robustness of Deep Networks
    Hyun, Changhun
    Park, Hyeyoung
    IEEE ACCESS, 2024, 12 : 83248 - 83259
  • [9] Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
    Khamaiseh, Samer Y.
    Bagagem, Derek
    Al-Alaj, Abdullah
    Mancino, Mathew
    Alomari, Hakam W.
    IEEE ACCESS, 2022, 10 : 102266 - 102291
  • [10] Hadamard's Defense Against Adversarial Examples
    Hoyos, Angello
    Ruiz, Ubaldo
    Chavez, Edgar
    IEEE ACCESS, 2021, 9 : 118324 - 118333