Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters

被引:1
|
作者
Dang Duy Thang [1 ,2 ]
Matsui, Toshihiro [1 ]
机构
[1] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
[2] Univ Da Nang, Univ Sci & Technol, Fac Informat Technol, Da Nang 550000, Vietnam
关键词
Machine learning; Data models; Training; Security; Biological neural networks; Information filtering; Artificial neural networks; adversarial examples; image classification; information security; image filtering; image analysis; DEEP NEURAL-NETWORKS;
D O I
10.1109/ACCESS.2020.2978056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed out the vulnerabilities of deep learning models. And one of the security issues related to deep learning models is adversarial examples that are an instance with very small, intentional feature perturbations that cause a machine learning model to make a wrong prediction. There have been many proposed defensive methods to combat or detect adversarial examples but still not perfect, powerful and still need a lot of fine-tuning in the process of installing security systems. In this work, we introduce a completely automated method of identifying adversarial examples by using image transformation and filter techniques in an end-to-end system. By exploring the adversarial features that are sensitive to geometry and frequency, we integrate the geometric transformation and denoising based on the frequency domain for identifying adversarial examples. Our proposed detection system is evaluated on popular data sets such as ImageNet or MNIST and gives accurate results up to 99.9 & x0025; with many optimizations.
引用
收藏
页码:44426 / 44442
页数:17
相关论文
共 50 条
  • [41] A Robust Adversarial Network-Based End-to-End Communications System with Strong Generalization Ability Against Adversarial Attacks
    Dong, Yudi
    Wang, Huaxia
    Yao, Yu-Dong
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4086 - 4091
  • [42] End-to-End Optimized ROI Image Compression
    Cai, Chunlei
    Chen, Li
    Zhang, Xiaoyun
    Gao, Zhiyong
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 3442 - 3457
  • [43] End-to-End Learning for Image Burst Deblurring
    Wieschollek, Patrick
    Schoelkopf, Bernhard
    Lensch, Hendrik P. A.
    Hirsch, Michael
    COMPUTER VISION - ACCV 2016, PT IV, 2017, 10114 : 35 - 51
  • [44] End-to-End FusVAE for Face Image Fusion
    Li, Xiang
    Chen, Bo
    Wen, Meijin
    Wang, Haoshuang
    2018 INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND ARTIFICIAL INTELLIGENCE (ACAI 2018), 2018,
  • [45] Efficient end-to-end multispectral image compression
    Depoian, Arthur C., II
    Bailey, Colleen P.
    Guturu, Parthasarathy
    BIG DATA VI: LEARNING, ANALYTICS, AND APPLICATIONS, 2024, 13036
  • [46] End-to-End Deep ROI Image Compression
    Akutsu, Hiroaki
    Naruko, Takahiro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (05): : 1031 - 1038
  • [47] End-to-End Optimized 360° Image Compression
    Li, Mu
    Li, Jinxing
    Gu, Shuhang
    Wu, Feng
    Zhang, David
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 31 : 6267 - 6281
  • [48] End-to-end Learning for Encrypted Image Retrieval
    Feng, Qihua
    Li, Peiya
    Lu, ZhiXun
    Liu, Guan
    Huang, Feiran
    2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
  • [49] End-to-End Quality Controllable Image Compression
    Wang, Luge
    Mao, Xionghui
    Zhang, Saiping
    Yang, Fuzheng
    2022 PICTURE CODING SYMPOSIUM (PCS), 2022, : 229 - 233
  • [50] AN EFFICIENT END-TO-END IMAGE COMPRESSION TRANSFORMER
    Jeny, Afsana Ahsan
    Junayed, Masum Shah
    Islam, Md Baharul
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 1786 - 1790