Discretization Based Solutions for Secure Machine Learning Against Adversarial Attacks

被引:25
|
作者
Panda, Priyadarshini [1 ]
Chakraborty, Indranil [1 ]
Roy, Kaushik [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Adversarial robustness; deep learning; discretization techniques; binarized neural networks;
D O I
10.1109/ACCESS.2019.2919463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial examples are perturbed inputs that are designed (from a deep learning network's (DLN) parameter gradients) to mislead the DLN during test time. Intuitively, constraining the dimensionality of inputs or parameters of a network reduces the "space" in which adversarial examples exist. Guided by this intuition, we demonstrate that discretization greatly improves the robustness of the DLNs against adversarial attacks. Specifically, discretizing the input space (or allowed pixel levels from 256 values or 8bit to 4 values or 2bit) extensively improves the adversarial robustness of the DLNs for a substantial range of perturbations for minimal loss in test accuracy. Furthermore, we find that binary neural networks (BNNs) and related variants are intrinsically more robust than their full precision counterparts in adversarial scenarios. Combining input discretization with the BNNs furthers the robustness, even waiving the need for adversarial training for the certain magnitude of perturbation values. We evaluate the effect of discretization on MNIST, CIFAR10, CIFAR100, and ImageNet datasets. Across all datasets, we observe maximal adversarial resistance with 2bit input discretization that incurs an adversarial accuracy loss of just similar to 1% - 2% as compared to clean test accuracy against single-step attacks. We also show standalone discretization remains vulnerable to stronger multi-step attack scenarios necessitating the use of adversarial training with discretization as an improved defense strategy.
引用
收藏
页码:70157 / 70168
页数:12
相关论文
共 50 条
  • [21] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    Marshev, I. I.
    Zhukovskii, E., V
    Aleksandrova, E. B.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1025 - 1028
  • [22] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I. V.
    Saenko, I. B.
    Lauta, O. S.
    Vasilev, N. A.
    Sadovnikov, V. E.
    PATTERN RECOGNITION AND IMAGE ANALYSIS, 2024, 34 (03) : 589 - 596
  • [23] Adversarial Attacks in Explainable Machine Learning: A Survey of Threats Against Models and Humans
    Vadillo, Jon
    Santana, Roberto
    Lozano, Jose A.
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2025, 15 (01)
  • [24] Enhanced Security Against Volumetric DDoS Attacks Using Adversarial Machine Learning
    Shroff, Jugal
    Walambe, Rahee
    Singh, Sunil Kumar
    Kotecha, Ketan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [25] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    I. I. Marshev
    E. V. Zhukovskii
    E. B. Aleksandrova
    Automatic Control and Computer Sciences, 2021, 55 : 1025 - 1028
  • [26] Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems
    Yao, Likai
    Shao, Sicong
    Hariri, Salim
    2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [27] Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
    Catak, Ferhat Ozgur
    Kuzlu, Murat
    Tang, Haolin
    Catak, Evren
    Zhao, Yanxiao
    IEEE ACCESS, 2022, 10 : 100267 - 100275
  • [28] Using Undervolting as an on-Device Defense Against Adversarial Machine Learning Attacks
    Majumdar, Saikat
    Samavatian, Mohammad Hossein
    Barber, Kristin
    Teodorescu, Radu
    2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 158 - 169
  • [29] SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks
    Chen, Lingwei
    Hou, Shifu
    Ye, Yanfang
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 362 - 372
  • [30] Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data
    Zhou, Jiahui
    Zaidi, Nayyar
    Zhang, Yishuo
    Li, Gang
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT II, 2022, 13281 : 367 - 379