Really natural adversarial examples

被引:0
|
作者
Anibal Pedraza
Oscar Deniz
Gloria Bueno
机构
[1] VISILAB,
[2] ETSI Industriales,undefined
来源
International Journal of Machine Learning and Cybernetics | 2022年 / 13卷
关键词
Natural adversarial; Adversarial examples; Trustworthy machine learning; Computer vision;
D O I
暂无
中图分类号
学科分类号
摘要
The phenomenon of Adversarial Examples has become one of the most intriguing topics associated to deep learning. The so-called adversarial attacks have the ability to fool deep neural networks with inappreciable perturbations. While the effect is striking, it has been suggested that such carefully selected injected noise does not necessarily appear in real-world scenarios. In contrast to this, some authors have looked for ways to generate adversarial noise in physical scenarios (traffic signs, shirts, etc.), thus showing that attackers can indeed fool the networks. In this paper we go beyond that and show that adversarial examples also appear in the real-world without any attacker or maliciously selected noise involved. We show this by using images from tasks related to microscopy and also general object recognition with the well-known ImageNet dataset. A comparison between these natural and the artificially generated adversarial examples is performed using distance metrics and image quality metrics. We also show that the natural adversarial examples are in fact at a higher distance from the originals that in the case of artificially generated adversarial examples.
引用
收藏
页码:1065 / 1077
页数:12
相关论文
共 50 条
  • [21] Restoration of Adversarial Examples Using Image Arithmetic Operations
    Ali, Kazim
    Quershi, Adnan N.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (01) : 271 - 284
  • [22] Heuristic-word-selection Genetic Algorithm for Generating Natural Language Adversarial Examples
    Ye, Shijun
    Zhang, Pengcheng
    Dong, Hai
    Ji, Shunhui
    THIRD IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE TESTING (AITEST 2021), 2021, : 39 - 40
  • [23] Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks
    Tang, Pengfei
    Wang, Wenjie
    Lou, Jian
    Xiong, Li
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4145 - 4155
  • [24] Adversarial transformation network with adaptive perturbations for generating adversarial examples
    Zhang, Guoyin
    Da, Qingan
    Li, Sizhao
    Sun, Jianguo
    Wang, Wenshan
    Hu, Qing
    Lu, Jiashuai
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2022, 20 (02) : 94 - 103
  • [25] A novel approach to generating high-resolution adversarial examples
    Fang, Xianjin
    Li, Zhiwei
    Yang, Gaoming
    APPLIED INTELLIGENCE, 2022, 52 (02) : 1289 - 1305
  • [26] A novel approach to generating high-resolution adversarial examples
    Xianjin Fang
    Zhiwei Li
    Gaoming Yang
    Applied Intelligence, 2022, 52 : 1289 - 1305
  • [27] Adversarial Examples Detection and Analysis with Layer-wise Autoencoders
    Wojcik, Bartosz
    Morawiecki, Pawel
    Smieja, Marek
    Krzyzek, Tomasz
    Spurek, Przemyslaw
    Tabor, Jacek
    2021 IEEE 33RD INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2021), 2021, : 1322 - 1326
  • [28] Adversarial Examples for Hamming Space Search
    Yang, Erkun
    Liu, Tongliang
    Deng, Cheng
    Tao, Dacheng
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (04) : 1473 - 1484
  • [29] The Problem of the Adversarial Examples in Deep Learning
    Zhang S.-S.
    Zuo X.
    Liu J.-W.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (08): : 1886 - 1904
  • [30] Effect of adversarial examples on the robustness of CAPTCHA
    Zhang, Yang
    Gao, Haichang
    Pei, Ge
    Kang, Shuai
    Zhou, Xin
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 1 - 10