Paper Review: Adversarial Examples

1. One pixel attack for fooling deep neural networks

  • Motivation:
    - Generating adversarial images can be formalized as an optimization problem with constraints. We assume an input image can be represented by a vector in which each scalar element represents one pixel. Let f f f be the target image clas- sifier which receives n-dimensional inputs
    - Let f f f be the target image classifier which receives n-dimensional inputs, x = ( x 1 , . . . , x n ) \mathbf{x}=(x_1,...,x_n) x=(x1,...,xn) be the original natural image correctly classified as class t t t.
    - The probability of x \mathbf{x} x belonging to the class t is therefore f t ( x ) f_t(\mathbf{x}) ft(x).
    - The vector e ( x ) = ( e 1 , . . . , e n ) e(\mathbf{x})=(e_1,...,e_n) e(x)=(e1,...,en) is an additive adver- sarial perturbation according to x \mathbf{x} x, the target class a d v adv adv and the limitation of maximum modification L L L.
    - Note that L L L is always measured by the length of vector e ( x ) e(\mathbf{x}) e(x).
    - The goal of adversaries in the case of targeted attacks is to find the optimized solution e ( x ) ∗ e(\mathbf{x})^* e(x) for the following question:
    在这里插入图片描述
  • (a) which dimensions that need to be perturbed
  • (b) the correspond- ing strength of the modification for each dimension

- In our approach, the equation is slightly different:
在这里插入图片描述

  • In the case of one-piexl attack d = 1 d=1 d=1.
  • Previous works commonly modify a part of all dimensions while in our approach only d dimensions are modified with the other dimensions of e ( x ) e(\mathbf{x}) e(x) left to zeros.
  • Do the experiment on three different networks for classification (All Convolution Network, Network in Network, VGG16 Network)
  • Some results for CIFAR-10 classification

在这里插入图片描述

在这里插入图片描述

2. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

I Intro
  • Szegedy et al. [22] first discovered an intriguing weakness of deep neural networks in the context of image classification.

发现当下的深度网络对adversarial attacks in the form of small perturbations to images that remain (almost) imperceptible to human vision system毫无抵抗之力。

  • Moosavi-Dezfooli et al. [16] showed the existence of ‘uni- versal perturbations’ that can fool a network classifier on any image (see Fig. 1 for example)
  • Similarly, Athalye et al. [65] demonstrated that it is possible to even 3-D print real- world objects that can fool deep neural network classifiers (see Section IV-C)
  • Review parts (II~)
II Definition of terms
  • Adversarial example/image is is a modified version of a clean image that is intentionally perturbed (e.g. by adding noise) to confuse/fool a machine learning tech- nique, such as deep neural networks.
  • Adversarial perturbation is the noise that is added to the clean image to make it an adversarial example.
  • Adversarial training uses adversarial images besides the clean images to train machine learning models.
  • Adversary more commonly refers to the agent who creates an adversarial example. However, in some cases the example itself is also called adversary.
  • Black-box attacks feed a targeted model with the adversarial examples (during testing) that are generated without the knowledge of that model. In some instances, it is assumed that the adversary has a limited knowledge of the model (e.g. its training procedure and/or its archi- tecture) but definitely does not know about the model. parameters. In other instances, using any information about the target model is referred to as ‘semi-black-box’ attack. We use the former convention in this article.
  • Detector is a mechanism to (only) detect if an image is an adversarial example.
  • Fooling ratio/rate indicates the percentage of images on which a trained model changes its prediction label after the images are perturbed.
  • One-shot/one-step methods generate an adversarial per- turbation by performing a single step computation, e.g. computing gradient of model loss once. The opposite are iterative methods that perform the same computation multiple times to get a single perturbation. The latter are often computationally expensive.
  • Quasi-imperceptible perturbations impair images very slightly for human perception.
  • Rectifier modifies an adversarial example to restore the prediction of the targeted model to its prediction on the clean version of the same example.
  • Targeted attacks fool a model into falsely predicting a specific label for the adversarial image. They are oppo- site to the non-targeted attacks in which the predicted label of the adversarial image is irrelevant, as long as it is not the correct label.
  • Threat model refers to the types of potential attacks considered by an approach, e.g. black-box attack.
  • Transferability refers to the ability of an adversarial example to remain effective even for the models other than the one used to generate it.
  • Universal perturbation is able to fool a given model on ‘any’ image with high probability. Note that, universality refers to the property of a perturbation being ‘image- agnostic’ as opposed to having good transferability.
  • White-box attacks assume the complete knowledge of the targeted model, including its parameter values, architecture, training method, and in some cases its training data as well.
III ADVERSARIAL ATTACKS (IN ‘laboratory settings’)

This part covers the literature in CV that introduces methods for adversarial attacks on deep learning and in laboratory settings. E.g. recognition, and their effectiveness is demostrated using standard datasets, e.g. MNIST[10].

  • A. ATTACKS FOR CLASSIFICATION
  • 1) BOX-CONSTRAINED L-BFGS
    Szegedy et al. proposed to solve the following problem
    在这里插入图片描述
    在这里插入图片描述
  • 2) FAST GRADIENT SIGN METHOD (FGSM)
    To enable effec- tive adversarial training, Goodfellow et al. [23] developed a method to efficiently compute an adversarial perturbation for a given image by solving the following problem:
    在这里插入图片描述
    Kurakin et al. [80] proposed a ‘one-step target class’ variation of the FGSM where instead of using the true label ? of the image in (3), they used the label ?target of the least likely class predicted by the network for I c \mathbf{I}_c Ic. The computed perturbation is then subtracted from the original image to make it an adversarial example.
    Miyato et al. [103] proposed a closely related method to compute the perturbation as follows
    在这里插入图片描述
  • 3/) BASIC & LEAST-LIKELY-CLASS ITERATIVE METHODS
    The one-step methods perturb images by taking a single large step in the direction that increases the loss of the classifier (i.e. one-step gradient ascent). An intuitive extension of this idea is to iteratively take multiple small steps while adjusting the direction after each step. [35], [55]
  • 4/) JACOBIAN-BASED SALIENCY MAP ATTACK (JSMA)
    Papernot et al. [60] also created an adversarial attack by restricting the l0-norm of the perturbations. Physically, it means that the goal is to modify only a few pixels in the image instead of perturbing the whole image to fool the classifie.
  • 5/) ONE PIXEL ATTACK
    An extreme case for the adversarial attack is when only one pixel in the image is changed to fool the classifier. Inter- estingly, Su et al. [68] claimed successful fooling of three different network models on 70.97% of the tested images by changing just one pixel per image. Su et al. computed the adversarial examples by using the concept of Differential
    Evolution [146].
  • 6/) CARLINI AND WAGNER ATTACKS (C&W)
    A set of three adversarial attacks were introduced by Carlini and Wagner [36] in the wake of defensive distillation against the adversarial perturbations [38].
  • 7/) DEEPFOOL
    Moosavi-Dezfooli et al. [72] proposed to compute a minimal norm adversarial perturbation for a given image in an iterative manner.
    8 /) UNIVERSAL ADVERSARIAL PERTURBATIONS
    9/) UPSET AND ANGRI
    10/) HOUDINI
    11/) ADVERSARIAL TRANSFORMATION NETWORKS (ATNs)
    12/) MISCELLANEOUS ATTACKS
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值