Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks

被引:1
|
作者
Qin C. [1 ]
Chen Y. [2 ]
Chen K. [1 ]
Dong X. [1 ]
Zhang W. [1 ]
Mao X. [2 ]
He Y. [2 ]
Yu N. [1 ]
机构
[1] University of Science and Technology of China, Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, School of Cyber Science and Technology, Hefei
[2] Alibaba Group, Hangzhou
来源
基金
中国国家自然科学基金;
关键词
Adversarial examples; detection; information hiding; second-round adversarial attacks; steganalysis;
D O I
10.1109/TAI.2022.3190816
中图分类号
学科分类号
摘要
Convolutional neural networks (CNNs) achieve remarkable performances in various areas. However, adversarial examples threaten their security. They are designed to mislead CNNs to output incorrect results. Many methods are proposed to detect adversarial examples. Unfortunately, most detection-based defense methods are vulnerable to second-round adversarial attacks, which can simultaneously deceive the base model and the detector. To resist such second-round adversarial attacks, handcrafted steganalysis features are introduced to detect adversarial examples, while such a method receives low accuracy at detecting sparse perturbations. In this article, we propose to combine handcrafted features with deep features via a fusion scheme to increase the detection accuracy and defend against second-round adversarial attacks. To avoid deep features being overwhelmed by high-dimensional handcrafted features, we propose an expansion-then-reduction process to compress the dimensionality of handcrafted features. Experimental results show that the proposed model outperforms the state-of-the-art adversarial example detection methods and remains robust under various second-round adversarial attacks. © 2020 IEEE.
引用
收藏
页码:1029 / 1040
页数:11
相关论文
共 50 条
  • [1] Robust Android Malware Detection against Adversarial Example Attacks
    Li, Heng
    Zhou, Shiyao
    Yuan, Wei
    Luo, Xiapu
    Gao, Cuiying
    Chen, Shuiyan
    PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 3603 - 3612
  • [2] Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training
    Zhang, Haichao
    Wang, Jianyu
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [3] Adversarial Feature Selection Against Evasion Attacks
    Zhang, Fei
    Chan, Patrick P. K.
    Biggio, Battista
    Yeung, Daniel S.
    Roli, Fabio
    IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (03) : 766 - 777
  • [4] On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification
    Park, Sanglee
    So, Jungmin
    APPLIED SCIENCES-BASEL, 2020, 10 (22): : 1 - 16
  • [5] A Robust Malware Detection Approach for Android System against Adversarial Example Attacks
    Li, Wenjia
    Bala, Neha
    Ahmar, Aemun
    Tovar, Fernanda
    Battu, Arpit
    Bambarkar, Prachi
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 360 - 365
  • [6] Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems
    Haroon, Muhammad Shahzad
    Ali, Husnain Mansoor
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3513 - 3527
  • [7] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101
  • [8] On the robustness of skeleton detection against adversarial attacks
    Bai, Xiuxiu
    Yang, Ming
    Liu, Zhe
    NEURAL NETWORKS, 2020, 132 : 416 - 427
  • [9] Novel Exploit Feature-Map-Based Detection of Adversarial Attacks
    Almuflih, Ali Saeed
    Vyas, Dhairya
    Kapdia, Viral V.
    Qureshi, Mohamed Rafik Noor Mohamed
    Qureshi, Karishma Mohamed Rafik
    Makkawi, Elaf Abdullah
    APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [10] Adversarial Attacks for Object Detection Based on Region of Interest of Feature Maps
    Wang, Yekui
    Cao, Tieyong
    Zheng, Yunfei
    Fang, Zheng
    Wang, Yang
    Liu, Yajiu
    Fu, Bingyang
    Chen, Lei
    Computer Engineering and Applications, 2024, 59 (02) : 261 - 270