Detection of Iterative Adversarial Attacks via Counter Attack

被引:0
|
作者
Rottmann, Matthias [1 ]
Maag, Kira [2 ]
Peyron, Mathis [3 ]
Gottschalk, Hanno [4 ]
Krejic, Natasa [5 ]
机构
[1] Univ Wuppertal, Dept Math, Wuppertal, Germany
[2] Ruhr Univ Bochum, Fac Comp Sci, Bochum, Germany
[3] Inst Rech Informat Toulouse, Toulouse, France
[4] Tech Univ Berlin, Inst Math, Berlin, Germany
[5] Univ Novi Sad, Fac Sci, Dept Math & Informat, Novi Sad, Serbia
关键词
Deep neural networks; Adversarial attacks; Counter attacks; Asymptotically perfect detection;
D O I
10.1007/s10957-023-02273-6
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Deep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs. Various attacks, hardening methods and detection methods have been introduced in recent years. Notoriously, Carlini-Wagner (CW)type attacks computed by iterative minimization belong to those that are most difficult to detect. In this work we outline a mathematical proof that the CW attack can be used as a detector itself. That is, under certain assumptions and in the limit of attack iterations this detector provides asymptotically optimal separation of original and attacked images. In numerical experiments, we experimentally validate this statement and furthermore obtain AUROC values up to 99.73% on CIFAR10 and ImageNet. This is in the upper part of the spectrum of current state-of-the-art detection rates for CW attacks.
引用
收藏
页码:892 / 929
页数:38
相关论文
共 50 条
  • [21] Adaptive iterative attack towards explainable adversarial robustness
    Shi, Yucheng
    Han, Yahong
    Zhang, Quanxin
    Kuang, Xiaohui
    PATTERN RECOGNITION, 2020, 105
  • [22] A robust fingerprint presentation attack detection method against unseen attacks through adversarial learning
    Pereira, Joao Afonso
    Sequeira, Ana F.
    Pernes, Diogo
    Cardoso, Jaime S.
    2020 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2020, P-306
  • [23] Detection by Attack: Detecting Adversarial Samples by Undercover Attack
    Zhou, Qifei
    Zhang, Rong
    Wu, Bo
    Li, Weiping
    Mo, Tong
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 146 - 164
  • [24] An Adversarial Attack via Penalty Method
    Sun, Jiyuan
    Yu, Haibo
    Zhao, Jianjun
    IEEE ACCESS, 2025, 13 : 18123 - 18140
  • [25] Graph Adversarial Attack via Rewiring
    Ma, Yao
    Wang, Suhang
    Derr, Tyler
    Wu, Lingfei
    Tang, Jiliang
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1161 - 1169
  • [26] Detection of Face Recognition Adversarial Attacks
    Massoli, Fabio Valerio
    Carrara, Fabio
    Amato, Giuseppe
    Falchi, Fabrizio
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2021, 202
  • [27] CONTEXTUAL ADVERSARIAL ATTACKS FOR OBJECT DETECTION
    Zhang, Hantao
    Zhou, Wengang
    Li, Houqiang
    2020 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2020,
  • [28] Detection of sticker based adversarial attacks
    Horvath, Andras
    Egervari, Csanad
    TENTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2018), 2018, 10806
  • [29] Adversarial attacks on fingerprint liveness detection
    Fei, Jianwei
    Xia, Zhihua
    Yu, Peipeng
    Xiao, Fengjun
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [30] Adversarial Attacks on Mobile Malware Detection
    Shahpasand, Maryam
    Hamey, Len
    Vatsalan, Dinusha
    Xue, Minhui
    2019 IEEE 1ST INTERNATIONAL WORKSHOP ON ARTIFICIAL INTELLIGENCE FOR MOBILE (AI4MOBILE '19), 2019, : 17 - 20