Defense Against Adversarial Attacks by Reconstructing Images

被引:30
|
作者
Zhang, Shudong [1 ]
Gao, Haichang [1 ]
Rao, Qingxun [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Perturbation methods; Image reconstruction; Training; Iterative methods; Computational modeling; Predictive models; Transform coding; CNN; adversarial examples; adversarial attacks; defend; residual block; reconstruction network; perceptual loss;
D O I
10.1109/TIP.2021.3092582
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Convolutional neural networks (CNNs) are vulnerable to being deceived by adversarial examples generated by adding small, human-imperceptible perturbations to a clean image. In this paper, we propose an image reconstruction network that reconstructs an input adversarial example into a clean output image to defend against such adversarial attacks. Due to the powerful learning capabilities of the residual block structure, our model can learn a precise mapping from adversarial examples to reconstructed examples. The use of a perceptual loss greatly suppresses the error amplification effect and improves the performance of our reconstruction network. In addition, by adding randomization layers to the end of the network, the effects of additional noise are further suppressed, especially for iterative attacks. Our model has the following four advantages. 1) It greatly reduces the impact of adversarial perturbations while having little influence on the prediction performance of clean images. 2) During inference phase, it performs better than most existing model-agnostic defense methods. 3) It has better generalization capability. 4) It can be flexibly combined with other methods, such as adversarially trained models.
引用
收藏
页码:6117 / 6129
页数:13
相关论文
共 50 条
  • [31] Dynamic Hypersphere Embedding Scale Against Adversarial Attacks
    Hassanin, Mohammed
    Moustafa, Nour
    Razzak, Imran
    Tanveer, M.
    Ormrod, David
    Slay, Jill
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 12475 - 12486
  • [32] Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations
    Qing, Yuanyuan
    Bai, Tao
    Liu, Zhuotao
    Moulin, Pierre
    Wen, Bihan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2814 - 2825
  • [33] Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks
    Xue, Mingfu
    Yuan, Chengxiang
    He, Can
    Wu, Yinghao
    Wu, Zhiyu
    Zhang, Yushu
    Liu, Zhe
    Liu, Weiqiang
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 153 - 169
  • [34] Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns
    Lee, Hong Joo
    Ro, Yong Man
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4110 - 4121
  • [35] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [36] (Compress and Restore)N : A Robust Defense Against Adversarial Attacks on Image Classification
    Ferrari, Claudio
    Becattini, Federico
    Galteri, Leonardo
    Del Bimbo, Alberto
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2023, 19 (01)
  • [37] Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks
    Li, Xiaoting
    Chen, Lingwei
    Zhang, Jinquan
    Larus, James
    Wu, Dinghao
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [38] Defense against adversarial attacks: robust and efficient compressed optimized neural networks
    Insaf Kraidia
    Afifa Ghenai
    Samir Brahim Belhaouari
    Scientific Reports, 14
  • [39] Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis
    Alhussien, Nour
    Aleroud, Ahmed
    Melhem, Abdullah
    Khamaiseh, Samer Y.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 2751 - 2772
  • [40] Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks
    Li, Yantao
    Ruan, Song
    Qin, Huafeng
    Deng, Shaojiang
    El-Yacoubi, Mounim A.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1509 - 1523