An adversarial attack detection method in deep neural networks based on re-attacking approach

被引:4
作者
Ahmadi, Morteza Ali [1 ]
Dianat, Rouhollah [1 ]
Amirkhani, Hossein [1 ]
机构
[1] Univ Qom, Dept Comp Engn & Informat Technol, Qom, Iran
关键词
Adversarial attack; Adversarial example; Adversarial attack detection; Re-attacking; Decision boundary;
D O I
10.1007/s11042-020-10261-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new method for detecting adversarial attacks on deep neural networks. Our algorithm is based on the intuition that attacking input images results in different displacement vectors for clean and adversarial classes. For example, if the input image is an adversarial example, the re-attacking process results in a displacement vector with a short length in the feature space, but this displacement is considerable for clean images. We train our detector based on these displacement vectors. The experimental results show that compared to the current learning-based adversarial detection methods, the proposed system is capable of detecting the adversarial examples using a far simpler network. In addition, the proposed method is independent of the attack type, and is able to detect even novel attacks. It is also revealed that the proposed system learns the discrimination function even using a small amount of training data without any hyper-parameter tuning. We obtain remarkable results in detecting adversarial examples which are placed near and far from the decision boundary, improving state-of-the-art in detecting 2-norm Carlini and Wagner attack (L-2-C&W) and infinity-norm Projected Gradient Descent attack (L-infinity-PGD), where just Fast Gradient Sign Method (FGSM) is used for training the system.
引用
收藏
页码:10985 / 11014
页数:30
相关论文
共 75 条
[1]  
[Anonymous], 2016, NIPS
[2]  
[Anonymous], 2014, ARXIV14091556
[3]  
[Anonymous], 2017, ARXIV170300410
[4]  
[Anonymous], 2017, ARXIV170404960
[5]  
Athalye A, 2018, PR MACH LEARN RES, V80
[6]  
Behjati M, 2019, INT CONF ACOUST SPEE, P7345, DOI [10.1109/ICASSP.2019.8682430, 10.1109/icassp.2019.8682430]
[7]  
Bhagoji Arjun Nitin, 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS), DOI 10.1109/CISS.2018.8362326
[8]  
Buckman J., 2018, Thermometer Encoding: One Hot Way To Resist Adversar
[9]   Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification [J].
Cao, Xiaoyu ;
Gong, Neil Zhenqiang .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :278-287
[10]  
Carlini N., 2017, P 10 ACM WORKSH ART, P3