Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters

被引:1
|
作者
Dang Duy Thang [1 ,2 ]
Matsui, Toshihiro [1 ]
机构
[1] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
[2] Univ Da Nang, Univ Sci & Technol, Fac Informat Technol, Da Nang 550000, Vietnam
关键词
Machine learning; Data models; Training; Security; Biological neural networks; Information filtering; Artificial neural networks; adversarial examples; image classification; information security; image filtering; image analysis; DEEP NEURAL-NETWORKS;
D O I
10.1109/ACCESS.2020.2978056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed out the vulnerabilities of deep learning models. And one of the security issues related to deep learning models is adversarial examples that are an instance with very small, intentional feature perturbations that cause a machine learning model to make a wrong prediction. There have been many proposed defensive methods to combat or detect adversarial examples but still not perfect, powerful and still need a lot of fine-tuning in the process of installing security systems. In this work, we introduce a completely automated method of identifying adversarial examples by using image transformation and filter techniques in an end-to-end system. By exploring the adversarial features that are sensitive to geometry and frequency, we integrate the geometric transformation and denoising based on the frequency domain for identifying adversarial examples. Our proposed detection system is evaluated on popular data sets such as ImageNet or MNIST and gives accurate results up to 99.9 & x0025; with many optimizations.
引用
收藏
页码:44426 / 44442
页数:17
相关论文
共 50 条
  • [31] END-TO-END TRANSFORMATION IN THE CEMEX SUPPLY CHAIN
    Hoyt, David
    Lee, Hau L.
    BUILDING SUPPLY CHAIN EXCELLENCE IN EMERGING ECONOMIES, 2007, 98 : 345 - 366
  • [32] END-TO-END TRAINING OF A LARGE VOCABULARY END-TO-END SPEECH RECOGNITION SYSTEM
    Kim, Chanwoo
    Kim, Sungsoo
    Kim, Kwangyoun
    Kumar, Mehul
    Kim, Jiyeon
    Lee, Kyungmin
    Han, Changwoo
    Garg, Abhinav
    Kim, Eunhyang
    Shin, Minkyoo
    Singh, Shatrughan
    Heck, Larry
    Gowda, Dhananjaya
    2019 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU 2019), 2019, : 562 - 569
  • [33] End-to-end Knowledge Triplet Extraction Combined with Adversarial Training
    Huang P.
    Zhao X.
    Fang Y.
    Zhu H.
    Xiao W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (12): : 2536 - 2548
  • [34] NVC-NET: END-TO-END ADVERSARIAL VOICE CONVERSION
    Nguyen, Bac
    Cardinaux, Fabien
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 7012 - 7016
  • [35] End-to-End Adversarial Learning for Intrusion Detection in Computer Networks
    Mohammadi, Bahram
    Sabokrou, Mohammad
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 270 - 273
  • [36] End-to-end Domain-Adversarial Voice Activity Detection
    Lavechin, Marvin
    Gill, Marie-Philippe
    Bousbib, Ruben
    Bredin, Herve
    Garcia-Perera, Leibny Paola
    INTERSPEECH 2020, 2020, : 3685 - 3689
  • [37] SPEAKER VERIFICATION USING END-TO-END ADVERSARIAL LANGUAGE ADAPTATION
    Rohdin, Johan
    Stafylakis, Themos
    Silnova, Anna
    Zeinali, Hossein
    Burget, Lukas
    Plchot, Oldrich
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 6006 - 6010
  • [38] LithoGAN: End-to-End Lithography Modeling with Generative Adversarial Networks
    Ye, Wei
    Alawieh, Mohamed Baker
    Lin, Yibo
    Pan, David Z.
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [39] The End-to-End Use of Source Code Examples: An Exploratory Study
    Holmes, Reid
    Cottrell, Rylan
    Walker, Robert J.
    Denzinger, Joerg
    2009 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, CONFERENCE PROCEEDINGS, 2009, : 555 - +
  • [40] Correlation via Synthesis: End-to-end Image Generation and Radiogenomic Learning Based on Generative Adversarial Network
    Xu, Ziyue
    Wang, Xiaosong
    Shin, Hoo-Chang
    Yang, Dong
    Roth, Holger
    Milletari, Fausto
    Zhang, Ling
    Xu, Daguang
    MEDICAL IMAGING WITH DEEP LEARNING, VOL 121, 2020, 121 : 857 - 866