Review on Image Processing Based Adversarial Example Defenses in Computer Vision

被引:41
|
作者
Qiu, Meikang [1 ]
Qiu, Han [2 ]
机构
[1] Harrisburg Univ, Dept Comp Sci, Harrisburg, PA 17101 USA
[2] Inst Polytech Paris, Telecom Paris, LTCI, Palaiseau, France
来源
2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2020年
关键词
Deep learning; adversarial examples; image denoising; image compression; computer vision; ROBUSTNESS;
D O I
10.1109/BigDataSecurity-HPSC-IDS49724.2020.00027
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent research works showed that deep neural networks are vulnerable to adversarial examples, which are usually maliciously created by carefully adding deliberate and imperceptible perturbations to examples. Several states of the art defense methods are proposed based on the existing image processing methods like image compression and image denoising. However, such approaches are not the final optimal solution for defense adversarial perturbations in DNN models. In this paper, we reviewed two main approaches to deploying image processing methods as a defense. By analyzing and discussing the remaining issues, we present two open questions for future research direction including the definition of adversarial perturbations and noises, the novel defense-aware threat model. A further research direction is also given by re-thinking the impacts of adversarial perturbations on all frequency bands.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [1] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [2] Comparative review of image processing and computer vision textbooks
    Maxwell, BA
    MEDICAL IMAGING 1998: IMAGE PROCESSING, PTS 1 AND 2, 1998, 3338 : 285 - 291
  • [3] Survey on Adversarial Example Attack for Computer Vision Systems
    Wang Z.-B.
    Wang X.
    Ma J.-J.
    Qin Z.
    Ren J.
    Ren K.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 436 - 468
  • [4] Adversarial attacks in computer vision: a survey
    Li, Chao
    Wang, Handing
    Yao, Wen
    Jiang, Tingsong
    JOURNAL OF MEMBRANE COMPUTING, 2024, 6 (2) : 130 - 147
  • [5] Safety-critical computer vision: an empirical survey of adversarial evasion attacks and defenses on computer vision systems
    Charles Meyers
    Tommy Löfstedt
    Erik Elmroth
    Artificial Intelligence Review, 2023, 56 : 217 - 251
  • [6] Adversarial example defense based on image reconstruction
    Zhang, Yu
    Xu, Huan
    Pei, Chengfei
    Yang, Gaoming
    PEERJ COMPUTER SCIENCE, 2021, 7
  • [7] Safety-critical computer vision: an empirical survey of adversarial evasion attacks and defenses on computer vision systems
    Meyers, Charles
    Lofstedt, Tommy
    Elmroth, Erik
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (SUPPL 1) : 217 - 251
  • [8] Medical Image Processing based on Generative Adversarial Networks: A Systematic Review
    Liu, Jun
    Li, Kunqi
    Dong, Hua
    Han, Yuanyuan
    Li, Rihui
    CURRENT MEDICAL IMAGING, 2024, 20
  • [9] Review on Generative Adversarial Networks: Focusing on Computer Vision and Its Applications
    Park, Sung-Wook
    Ko, Jae-Sub
    Huh, Jun-Ho
    Kim, Jong-Chan
    ELECTRONICS, 2021, 10 (10)
  • [10] A Review of Generative Adversarial Networks for Computer Vision Tasks
    Simion, Ana-Maria
    Radu, Serban
    Florea, Adina Magda
    ELECTRONICS, 2024, 13 (04)