ADS-detector: An attention-based dual stream adversarial example detection method

被引:19
作者
Guo, Sensen [1 ,2 ]
Li, Xiaoyu [1 ,2 ]
Zhu, Peican [3 ]
Mu, Zhiying [1 ,2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ Shenzhen, Res & Dev Inst, Shenzhen 518057, Guangdong, Peoples R China
[3] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Shaanxi, Peoples R China
基金
国家重点研发计划;
关键词
Adversarial example detection; Dual stream; Prediction confidence; Attention module; ROBUSTNESS;
D O I
10.1016/j.knosys.2023.110388
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial attacks seriously threaten the security of machine learning models. Thus, detecting adversarial examples has become an important and interesting research topic facing various adversarial attacks. However, the majority of existing adversarial example detection algorithms cannot perform well in detecting adversarial examples with slight perturbations. In this paper, we propose a novel attention-based dual stream detector (ADS-Detector) that can address the detection of adversarial examples with both slight and large perturbations. Specifically, we first design a data process module to generate pixel and prediction confidence stream data from the raw image. Then, we propose an N-layer attention module to extract the channel and spatial feature weights between the pixel and prediction confidence stream data. Eventually, we feed the dual-stream data into the same subdetection model with a convolutional block attention module; then, the output results are combined to determine whether the input image is an adversarial example or not. To validate the performance, we conduct extensive experiments on three public datasets: CIFAR10, Dogs vs. Cats and ImageNet. After sufficient analysis of the simulation results, we find that our proposed method outperforms the others for the detection of adversarial attacks generated by the considered attack methods.(c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:14
相关论文
共 46 条
[1]   Adversarial example detection for DNN models: a review and experimental comparison [J].
Aldahdooh, Ahmed ;
Hamidouche, Wassim ;
Fezza, Sid Ahmed ;
Deforges, Olivier .
ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) :4403-4462
[2]   Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search [J].
Andriushchenko, Maksym ;
Croce, Francesco ;
Flammarion, Nicolas ;
Hein, Matthias .
COMPUTER VISION - ECCV 2020, PT XXIII, 2020, 12368 :484-501
[3]  
Athalye A, 2018, PR MACH LEARN RES, V80
[4]  
Buckman J., 2018, THERMOMETER ENCODING
[5]  
Carlini N., 2017, ARXIV170507263
[6]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[7]   ADVERSARIAL EXAMPLES DETECTION BEYOND IMAGE SPACE [J].
Chen, Kejiang ;
Chen, Yuefeng ;
Zhou, Hang ;
Qin, Chuan ;
Mao, Xiaofeng ;
Zhang, Weiming ;
Yu, Nenghai .
2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, :3850-3854
[8]  
Chen PY, 2018, AAAI CONF ARTIF INTE, P10
[9]  
Cohen J, 2019, PR MACH LEARN RES, V97
[10]  
Croce F, 2020, PR MACH LEARN RES, V119