The Adversarial Attack and Detection under the Fisher Information Metric

被引:0
|
作者
Zhao, Chenxiao [1 ]
Fletcher, P. Thomas [2 ,3 ]
Yu, Mixue [1 ]
Peng, Yaxin [4 ,5 ]
Zhang, Guixu [1 ]
Shen, Chaomin [1 ,5 ]
机构
[1] East China Normal Univ, Dept Comp Sci, Shanghai, Peoples R China
[2] Univ Virginia, Dept Elect & Comp Sci, Charlottesville, VA 22903 USA
[3] Univ Virginia, Dept Comp Sci, Charlottesville, VA 22903 USA
[4] Shanghai Univ, Dept Math, Shanghai, Peoples R China
[5] Westlake Inst Brain Like Sci & Technol, Hangzhou, Zhejiang, Peoples R China
来源
THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE | 2019年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many deep learning models are vulnerable to the adversarial attack, i.e., imperceptible but intentionally-designed perturbations to the input can cause incorrect output of the networks. In this paper, using information geometry, we provide a reasonable explanation for the vulnerability of deep learning models. By considering the data space as a non-linear space with the Fisher information metric induced from a neural network, we first propose an adversarial attack algorithm termed one-step spectral attack (OSSA). The method is described by a constrained quadratic form of the Fisher information matrix, where the optimal adversarial perturbation is given by the first eigenvector, and the vulnerability is reflected by the eigenvalues. The larger an eigenvalue is, the more vulnerable the model is to be attacked by the corresponding eigenvector. Taking advantage of the property, we also propose an adversarial detection method with the eigenvalues serving as characteristics. Both our attack and detection algorithms are numerically optimized to work efficiently on large datasets. Our evaluations show superior performance compared with other methods, implying that the Fisher information is a promising approach to investigate the adversarial attacks and defenses.
引用
收藏
页码:5869 / 5876
页数:8
相关论文
共 50 条
  • [21] Adversarial Attack Detection via Fuzzy Predictions
    Li, Yi
    Angelov, Plamen
    Suri, Neeraj
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2024, 32 (12) : 7015 - 7024
  • [22] Attack Agnostic Statistical Method for Adversarial Detection
    Saha, Sambuddha
    Kumar, Aashish
    Sahay, Pratyush
    Jose, George
    Kruthiventi, Srinivas
    Muralidhara, Harikrishna
    2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW), 2019, : 798 - 802
  • [23] An Adversarial Attack Detection Paradigm With Swarm Optimization
    Qureshi, Ayyaz-Ul-Haq
    Larijani, Hadi
    Mtetwa, Nhamoinesu
    Yousefi, Mehdi
    Javed, Abbas
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [24] Adversarial Attack on Community Detection by Hiding Individuals
    Li, Jia
    Zhang, Honglei
    Han, Zhichao
    Rong, Yu
    Cheng, Hong
    Huang, Junzhou
    WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 917 - 927
  • [25] Adversarial Ensemble Modeling for Evasion Attack Detection
    Ahmed, Usman
    Lin, Jerry Chun-Wei
    2022 JOINT 12TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS AND 23RD INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (SCIS&ISIS), 2022,
  • [26] Incremental Adversarial Learning for Polymorphic Attack Detection
    Sabeel, Ulya
    Heydari, Shahram Shah
    El-Khatib, Khalil
    Elgazzar, Khalid
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 869 - 887
  • [27] AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems
    Patnaik, Sai Amrit
    Chansoriya, Shivali
    Namboodiri, Anoop M.
    Jain, Anil K.
    2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,
  • [28] Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples
    Zhao, Zhe
    Chen, Guangke
    Liu, Tong
    Li, Taishan
    Song, Fu
    Wang, Jingyi
    Sun, Jun
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (03)
  • [29] Application of the Fisher-Rao Metric to Structure Detection
    Stephen J. Maybank
    Journal of Mathematical Imaging and Vision, 2006, 25 : 49 - 62
  • [30] Application of the Fisher-Rao Metric to Ellipse Detection
    Stephen J. Maybank
    International Journal of Computer Vision, 2007, 72 : 287 - 307