Stylized Adversarial Defense

被引:3
|
作者
Naseer, Muzammal [1 ,2 ]
Khan, Salman [1 ,2 ]
Hayat, Munawar [3 ]
Khan, Fahad Shahbaz [1 ,4 ,5 ]
Porikli, Fatih [6 ]
机构
[1] Mohamed bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
[2] Australian Natl Univ, Canberra, ACT 2601, Australia
[3] Monash Univ, Clayton, Vic 3800, Australia
[4] Mohamed bin Zayed Univ Artificial Intelligence, Masdar, Abu Dhabi, U Arab Emirates
[5] Linkoping Univ, S-58183 Linkoping, Sweden
[6] Qualcomm, San Diego, CA 92121 USA
关键词
Training; Perturbation methods; Robustness; Multitasking; Predictive models; Computational modeling; Visualization; Adversarial training; style transfer; max-margin learning; adversarial attacks; multi-task objective;
D O I
10.1109/TPAMI.2022.3207917
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep Convolution Neural Networks (CNNs) can easily be fooled by subtle, imperceptible changes to the input images. To address this vulnerability, adversarial training creates perturbation patterns and includes them in the training set to robustify the model. In contrast to existing adversarial training methods that only use class-boundary information (e.g., using a cross-entropy loss), we propose to exploit additional information from the feature space to craft stronger adversaries that are in turn used to learn a robust model. Specifically, we use the style and content information of the target sample from another class, alongside its class-boundary information to create adversarial perturbations. We apply our proposed multi-task objective in a deeply supervised manner, extracting multi-scale feature knowledge to create maximally separating adversaries. Subsequently, we propose a max-margin adversarial training approach that minimizes the distance between source image and its adversary and maximizes the distance between the adversary and the target image. Our adversarial training approach demonstrates strong robustness compared to state-of-the-art defenses, generalizes well to naturally occurring corruptions and data distributional shifts, and retains the model's accuracy on clean examples.
引用
收藏
页码:6403 / 6414
页数:12
相关论文
共 50 条
  • [21] Exploring the Adversarial Frontier: Quantifying Robustness via Adversarial Hypervolume
    Guo, Ping
    Gong, Cheng
    Lin, Xi
    Yang, Zhiyuan
    Zhang, Qingfu
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2025, 9 (02): : 1367 - 1378
  • [22] Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense
    Li, Qian
    Hu, Qingyuan
    Lin, Chenhao
    Wu, Di
    Shen, Chao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5936 - 5949
  • [23] Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-Trained Models
    Maungmaung, Aprilpyone
    Echizen, Isao
    Kiya, Hitoshi
    IEEE OPEN JOURNAL OF SIGNAL PROCESSING, 2024, 5 : 902 - 913
  • [24] Randomized Purifier Based on Low Adversarial Transferability for Adversarial Defense
    Park, Sangjin
    Jung, Yoojin
    Song, Byung Cheol
    IEEE ACCESS, 2024, 12 : 109690 - 109701
  • [25] Adversarial Weight Prediction Networks for Defense of Industrial FDC Systems
    Yin, Zhenqin
    Ye, Lingjian
    Ge, Zhiqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (11) : 13201 - 13211
  • [26] Detection and Defense: Student-Teacher Network for Adversarial Robustness
    Park, Kyoungchan
    Kang, Pilsung
    IEEE ACCESS, 2024, 12 : 82742 - 82752
  • [27] An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks
    Qiu, Han
    Zeng, Yi
    Zheng, Qinkai
    Guo, Shangwei
    Zhang, Tianwei
    Li, Hewu
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (03) : 645 - 655
  • [28] Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms
    Zhang, Chaoyun
    Costa-Perez, Xavier
    Patras, Paul
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1294 - 1311
  • [29] Efficient Adversarial Defense without Adversarial Training: A Batch Normalization Approach
    Zhu, Yao
    Wei, Xiao
    Zhu, Yue
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [30] Defense Against Adversarial Attacks Using Topology Aligning Adversarial Training
    Kuang, Huafeng
    Liu, Hong
    Lin, Xianming
    Ji, Rongrong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3659 - 3673