Adversarial Example Generation Based on Particle Swarm Optimization

被引:4
|
作者
Qian Yaguan [1 ]
Lu Hongbo [1 ]
Ji Shouling [2 ]
Zhou Wujie [3 ]
Wu Shuhui [1 ]
Yun Bensheng [1 ]
Tao Xiangxing [1 ]
Lei Jingsheng [3 ]
机构
[1] Zhejiang Univ Sci & Technol, Sch Sci, Sch Big Data Sci, Hangzhou 310023, Zhejiang, Peoples R China
[2] Zhejiang Univ, Sch Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
[3] Zhejiang Univ Sci & Technol, Sch Elect & Informat Engn, Hangzhou 310023, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 浙江省自然科学基金;
关键词
Machine learning; Support Vector Machine(SVM); Exploring attacks; Salient perpetuation; Adversarial example; SVM;
D O I
10.11999/JEIT180777
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As machine learning is widely applied to various domains, its security vulnerability is also highlighted. A PSO (Particle Swarm Optimization) based adversarial example generation algorithm is proposed to reveal the potential security risks of Support Vector Machine (SVM). The adversarial examples, generated by slightly crafting the legitimate samples, can mislead SVM classifier to give wrong classification results. Using the linear separable property of SVM in high-dimensional feature space, PSO is used to find the salient features, and then the average method is used to map back to the original input space to construct the adversarial example. This method makes full use of the easily finding salient features of linear models in the feature space, and the interpretable advantages of the original input space. Experimental results show that the proposed method can fool SVM classifier by using the adversarial example generated by less than 7 % small perturbation, thus proving that SVM has obvious security vulnerability.
引用
收藏
页码:1658 / 1665
页数:8
相关论文
共 22 条
  • [1] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [2] Abnormal event detection in crowded scenes using one-class SVM
    Amraee, Somaieh
    Vafaei, Abbas
    Jamshidi, Kamal
    Adibi, Peyman
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2018, 12 (06) : 1115 - 1123
  • [3] Barreno M, 2006, P 2006 ACM S INF COM, P16
  • [4] Application of SVM and KNN to Duval Pentagon 1 for Transformer Oil Diagnosis
    Benmahamed, Y.
    Teguar, M.
    Boubakeur, A.
    [J]. IEEE TRANSACTIONS ON DIELECTRICS AND ELECTRICAL INSULATION, 2017, 24 (06) : 3443 - 3451
  • [5] Biggio B., 2011, P ACML, P97
  • [6] Biggio B., 2013, Poisoning attacks against support vector machines
  • [7] Biggio Battista, 2013, Evasion attacks against machine learning at test time
  • [8] Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks
    Chen, Zhuangbin
    Liu, Anfeng
    Li, Zhetao
    Choi, Young-June
    Sekiya, Hiroo
    Li, Jie
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [9] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
  • [10] Eberhart R, 1995, A new optimizer using particle swarm theory, P39, DOI [DOI 10.1109/MHS.1995.494215, 10.1109/mhs.1995.494215]