A Label-based Approach for Automatic Identifying Adversarial Examples with Image Transformation

被引:2
|
作者
Dang Duy Thang [1 ]
Matsui, Toshihiro [1 ]
机构
[1] Inst Informat Secur, Yokohama, Kanagawa, Japan
来源
2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR 2019) | 2019年
关键词
Deep Neural Networks; Adversarial Examples; Detection Systems; Image Transformation;
D O I
10.1109/CANDAR.2019.00021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Besides extraordinary results that deep neural networks are widely deployed in many fields such as computer vision, speech recognition, and natural language processing, in recent years deep neural networks have been recognized vulnerable to intentional modification of legitimate inputs called adversarial examples. These patterns are almost indistinguishable from AI models and human perception. Adversarial examples' concern is rising dramatically and is attracted by many research's apprehensiveness because of its tremendous impact. Unfortunately, until now there is none of the defenses has been shown to be very effective. In this paper, we introduce a new defense strategy against adversarial examples by using a label-based end-to-end system. Our proposed defense system can mostly distinguish adversarial samples and benign images without human intervention. We exploit the important role of spatial domain in adversarial attacks and proposing a state-of-the-art method for detecting adversarial examples based on our observation. We evaluate our system's performance on a variety of standard benchmark datasets including MNIST and ImageNet. Our proposed method reached out detection rates in a range from 94.6% to 99.2% in many settings.
引用
收藏
页码:112 / 120
页数:9
相关论文
共 8 条
  • [1] Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters
    Dang Duy Thang
    Matsui, Toshihiro
    IEEE ACCESS, 2020, 8 : 44426 - 44442
  • [2] ON THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES AGAINST CNN-BASED IMAGE FORENSICS
    Barni, M.
    Kallas, K.
    Nowroozi, E.
    Tondi, B.
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 8286 - 8290
  • [3] Adversarial Examples for Image Cropping: Gradient-Based and Bayesian-Optimized Approaches for Effective Adversarial Attack
    Yoshida, Masatomo
    Namura, Haruto
    Okuda, Masahiro
    IEEE ACCESS, 2024, 12 : 86541 - 86552
  • [4] Chinese adversarial examples generation approach with multi-strategy based on semantic
    Ou, Hongxu
    Yu, Long
    Tian, Shengwei
    Chen, Xin
    KNOWLEDGE AND INFORMATION SYSTEMS, 2022, 64 (04) : 1101 - 1119
  • [5] Chinese adversarial examples generation approach with multi-strategy based on semantic
    Hongxu Ou
    Long Yu
    Shengwei Tian
    Xin Chen
    Knowledge and Information Systems, 2022, 64 : 1101 - 1119
  • [6] A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning
    Wang, Yingdi
    Tian, Yunzhe
    Liu, Jiqiang
    Niu, Wenjia
    Tong, Endong
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (13)
  • [7] Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training
    Li, Yuanman
    Hu, Liangpei
    Dong, Li
    Wu, Haiwei
    Tian, Jinyu
    Zhou, Jiantao
    Li, Xia
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (03) : 1857 - 1872
  • [8] AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples
    Wang, Yixiang
    Liu, Jiqiang
    Chang, Xiaolin
    Wang, Jianhua
    Rodriguez, Ricardo J.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68