DLR: Adversarial examples detection and label recovery for deep neural networks

被引:0
|
作者
Han, Keji [1 ,2 ]
Ge, Yao [1 ,2 ]
Wang, Ruchuan [1 ,3 ]
Li, Yun [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Wenyuan Rd 9, Nanjing 210046, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Wenyuan Rd 9, Nanjing 210046, Jiangsu, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor N, Wenyuan Rd 9, Nanjing 210046, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep neural network; Generative classifier; Adversarial example; Anomaly detection;
D O I
10.1016/j.patrec.2024.12.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples crafted by adversaries to deceive the target model. Two popular approaches to mitigate this issue are adversarial training and adversarial example detection. Adversarial training aims to enable the target model to accurately recognize adversarial examples in image classification tasks; however, it often lacks generalizability. Conversely, adversarial detection demonstrates good generalization but does not assist the target model in recognizing adversarial examples. In this paper, we first define the label recovery task to address the adversarial challenges faced by DNNs. We then propose a novel generative classifier specifically for the adversarial example label recovery task. This method is termed Detection and Label Recovery (DLR), which comprises two components: Detector and Recover. The Detector processes both legitimate and adversarial examples, while the Recover component seeks to ascertain the ground-truth label of the detected adversarial example. DLR effectively combines the strengths of adversarial training and adversarial example detection. Experimental results demonstrate that our method outperforms several state-of-the-art approaches.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 50 条
  • [21] On a Detection Method of Adversarial Samples for Deep Neural Networks
    Govaers, Felix
    Baggenstoss, Paul
    2021 IEEE 24TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2021, : 423 - 427
  • [22] GradFuzz: Fuzzing deep neural networks with gradient vector coverage for adversarial examples
    Park, Leo Hyun
    Chung, Soochang
    Kim, Jaeuk
    Kwon, Taekyoung
    NEUROCOMPUTING, 2023, 522 : 165 - 180
  • [23] Complete Defense Framework to Protect Deep Neural Networks against Adversarial Examples
    Sun, Guangling
    Su, Yuying
    Qin, Chuan
    Xu, Wenbo
    Lu, Xiaofeng
    Ceglowski, Andrzej
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [24] Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction
    Liang, Bin
    Li, Hongcheng
    Su, Miaoqiang
    Li, Xirong
    Shi, Wenchang
    Wang, Xiaofeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 72 - 85
  • [25] Deep neural rejection against adversarial examples
    Angelo Sotgiu
    Ambra Demontis
    Marco Melis
    Battista Biggio
    Giorgio Fumera
    Xiaoyi Feng
    Fabio Roli
    EURASIP Journal on Information Security, 2020
  • [26] Deep neural rejection against adversarial examples
    Sotgiu, Angelo
    Demontis, Ambra
    Melis, Marco
    Biggio, Battista
    Fumera, Giorgio
    Feng, Xiaoyi
    Roli, Fabio
    EURASIP JOURNAL ON INFORMATION SECURITY, 2020, 2020 (01)
  • [27] Adversarial Examples Detection With Bayesian Neural Network
    Li, Yao
    Tang, Tongyi
    Hsieh, Cho-Jui
    Lee, Thomas C. M.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (05): : 3654 - 3664
  • [28] WHEN CAUSAL INTERVENTION MEETS ADVERSARIAL EXAMPLES AND IMAGE MASKING FOR DEEP NEURAL NETWORKS
    Yang, Chao-Han Huck
    Liu, Yi-Chieh
    Chen, Pin-Yu
    Ma, Xiaoli
    Tsai, Yi-Chang James
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 3811 - 3815
  • [29] EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
    Chen, Pin-Yu
    Sharma, Yash
    Zhang, Huan
    Yi, Jinfeng
    Hsieh, Cho-Jui
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 10 - 17
  • [30] Deep Networks with RBF Layers to Prevent Adversarial Examples
    Vidnerova, Petra
    Neruda, Roman
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, ICAISC 2018, PT I, 2018, 10841 : 257 - 266