Stylized Adversarial Defense

被引:3
|
作者
Naseer, Muzammal [1 ,2 ]
Khan, Salman [1 ,2 ]
Hayat, Munawar [3 ]
Khan, Fahad Shahbaz [1 ,4 ,5 ]
Porikli, Fatih [6 ]
机构
[1] Mohamed bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
[2] Australian Natl Univ, Canberra, ACT 2601, Australia
[3] Monash Univ, Clayton, Vic 3800, Australia
[4] Mohamed bin Zayed Univ Artificial Intelligence, Masdar, Abu Dhabi, U Arab Emirates
[5] Linkoping Univ, S-58183 Linkoping, Sweden
[6] Qualcomm, San Diego, CA 92121 USA
关键词
Training; Perturbation methods; Robustness; Multitasking; Predictive models; Computational modeling; Visualization; Adversarial training; style transfer; max-margin learning; adversarial attacks; multi-task objective;
D O I
10.1109/TPAMI.2022.3207917
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep Convolution Neural Networks (CNNs) can easily be fooled by subtle, imperceptible changes to the input images. To address this vulnerability, adversarial training creates perturbation patterns and includes them in the training set to robustify the model. In contrast to existing adversarial training methods that only use class-boundary information (e.g., using a cross-entropy loss), we propose to exploit additional information from the feature space to craft stronger adversaries that are in turn used to learn a robust model. Specifically, we use the style and content information of the target sample from another class, alongside its class-boundary information to create adversarial perturbations. We apply our proposed multi-task objective in a deeply supervised manner, extracting multi-scale feature knowledge to create maximally separating adversaries. Subsequently, we propose a max-margin adversarial training approach that minimizes the distance between source image and its adversary and maximizes the distance between the adversary and the target image. Our adversarial training approach demonstrates strong robustness compared to state-of-the-art defenses, generalizes well to naturally occurring corruptions and data distributional shifts, and retains the model's accuracy on clean examples.
引用
收藏
页码:6403 / 6414
页数:12
相关论文
共 50 条
  • [21] Randomize Adversarial Defense in a Light Way
    Park, Ji-Young
    Liu, Lin
    Liu, Jixue
    Li, Jiuyong
    Proceedings - 2022 IEEE International Conference on Big Data, Big Data 2022, 2022, : 1080 - 1089
  • [22] Defense against Universal Adversarial Perturbations
    Akhtar, Naveed
    Liu, Jian
    Mian, Ajmal
    2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 3389 - 3398
  • [23] Adversarial Attack and Defense in Deep Ranking
    Zhou, Mo
    Wang, Le
    Niu, Zhenxing
    Zhang, Qilin
    Zheng, Nanning
    Hua, Gang
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (08) : 5306 - 5324
  • [24] Deblurring as a Defense against Adversarial Attacks
    Duckworth, William, III
    Liao, Weixian
    Yu, Wei
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 61 - 67
  • [25] Adversarial Traces for Website Fingerprinting Defense
    Imani, Mohsen
    Rahman, Mohammad Saidur
    Wright, Matthew
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2225 - 2227
  • [26] Guard: Graph Universal Adversarial Defense
    Li, Jintang
    Liao, Jie
    Wu, Ruofan
    Chen, Liang
    Zheng, Zibin
    Dan, Jiawang
    Meng, Changhua
    Wang, Weiqiang
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 1198 - 1207
  • [27] Adaptive patch transformation for adversarial defense
    Zhang, Xin
    Xiao, Shijie
    Zhang, Han
    Ji, Lixia
    COMPUTERS & SECURITY, 2025, 153
  • [28] Adversarial Example Defense Based on the Supervision
    Yao, Ziyu
    Gao, Jiaquan
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [29] Random Normalization Aggregation for Adversarial Defense
    Dong, Minjing
    Chen, Xinghao
    Wang, Yunhe
    Xu, Chang
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [30] ADVERSARIAL DEFENSE FOR DEEP SPEAKER RECOGNITION USING HYBRID ADVERSARIAL TRAINING
    Pal, Monisankha
    Jati, Arindam
    Peri, Raghuveer
    Hsu, Chin-Cheng
    AbdAlmageed, Wael
    Narayanan, Shrikanth
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 6164 - 6168