Visualizing and Analyzing the Topology of Neuron Activations in Deep Adversarial Training

被引:0
|
作者
Zhou, Youjia [1 ]
Zhou, Yi [1 ]
Ding, Jie [2 ]
Wang, Bei [1 ]
机构
[1] Univ Utah, Salt Lake City, UT 84112 USA
[2] Univ Minnesota Twin Cities, Minneapolis, MN USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep models are known to be vulnerable to data adversarial attacks, and many adversarial training techniques have been developed to improve their adversarial robustness. While data adversaries attack model predictions through modifying data, little is known about their impact on the neuron activations produced by the model, which play a crucial role in determining the model's predictions and interpretability. In this work, we aim to develop a topological understanding of adversarial training to enhance its interpretability. We analyze the topological structure-in particular, mapper graphs-of neuron activations of data samples produced by deep adversarial training. Each node of a mapper graph represents a cluster of activations, and two nodes are connected by an edge if their corresponding clusters have a nonempty intersection. We provide an interactive visualization tool that demonstrates the utility of our topological framework in exploring the activation space. We found that stronger attacks make the data samples more indistinguishable in the neuron activation space that leads to a lower accuracy. Our tool also provides a natural way to identify the vulnerable data samples that may be useful in improving model robustness.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Benchmarking and Analyzing Deep Neural Network Training
    Zhu, Hongyu
    Akrout, Mohamed
    Zheng, Bojian
    Pelegris, Andrew
    Jayarajan, Anand
    Phanishayee, Amar
    Schroeder, Bianca
    Pekhimenko, Gennady
    2018 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION (IISWC), 2018, : 88 - 100
  • [22] Analyzing the Training Processes of Deep Generative Models
    Liu, Mengchen
    Shi, Jiaxin
    Cao, Kelei
    Zhu, Jun
    Liu, Shixia
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2018, 24 (01) : 77 - 87
  • [23] Deep Defense: Training DNNs with Improved Adversarial Robustness
    Yan, Ziang
    Guo, Yiwen
    Zhang, Changshui
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 31
  • [24] Adversarial Defence by Diversified Simultaneous Training of Deep Ensembles
    Huang, Bo
    Kei, Zhiwei
    Wang, Yi
    Wang, Wei
    Shen, Linlin
    Liu, Feng
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 7823 - 7831
  • [25] Adversarial Policy Training against Deep Reinforcement Learning
    Wu, Xian
    Guo, Wenbo
    Wei, Hua
    Xing, Xinyu
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1883 - 1900
  • [26] Adversarial Training Methods for Deep Learning: A Systematic Review
    Zhao, Weimin
    Alwidian, Sanaa
    Mahmoud, Qusay H.
    ALGORITHMS, 2022, 15 (08)
  • [27] Deep Semantic Hashing with Multi-Adversarial Training
    Wang, Bingning
    Liu, Kang
    Zhao, Jun
    CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 1453 - 1462
  • [28] Adversarial Training of Deep Autoencoders Towards Recommendation Tasks
    Chae, Dong-Kyu
    Kim, Sang-Wook
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 91 - 95
  • [29] Topology-guided Adversarial Deep Mutual Learning for Knowledge Distillation
    Lai X.
    Qu Y.-Y.
    Xie Y.
    Pei Y.-L.
    Zidonghua Xuebao/Acta Automatica Sinica, 2023, 49 (01): : 102 - 110
  • [30] Gradient Descent Analysis: On Visualizing the Training of Deep Neural Networks
    Becker, Martin
    Lippel, Jens
    Zielke, Thomas
    PROCEEDINGS OF THE 14TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS - VOL 3: IVAPP, 2019, : 338 - 345