Detecting adversarial examples using image reconstruction differences

被引:0
|
作者
Jiaze Sun
Meng Yi
机构
[1] Xi’an University of Posts and Telecommunications,School of Computer Science and Technology
[2] Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing,undefined
[3] Xi’an Key Laboratory of Big Data and Intelligent Computing,undefined
来源
Soft Computing | 2023年 / 27卷
关键词
Deep neural networks; Adversarial examples; Detection; Compress and reconstruct; Image reconstruction differences; Random forest;
D O I
暂无
中图分类号
学科分类号
摘要
The adversarial examples (AEs) cause misjudgments and damage the robustness of the DNNs systems. Previous studies have defended against AEs by detecting, but it is challenging to ensure a stable and high performance of detecting AEs, while with a poor false detection. To this end, an AEs detection method named image reconstruction differences (IRD) is proposed to enhance the robustness of DNNs. Firstly, we use an end-to-end Com-Rec network to reconstruct examples with feature compression to expand the distinguishing features. Secondly, propose an image reconstruction differences based on information-theoretic VIF, structural information UQI and spectral information RASE composition to discriminate AEs. Moreover, we introduce the idea of integrated learning to form a strong random forest binary classifier to enhance the performance of detecting AEs. We further validate it through extensive experiments on the MNIST and CIFAR-10 datasets. These experiments demonstrated that the IRD effectively detected AEs and achieved a high average accuracy of 98.33%. Specifically it also performs favorably against the following methods based on Feature Squeezing, Local Intrinsic Dimensionality, Kernel Density and Network Invariance Checking with an average detection rate of 99.54% and a 1.44% average false positive rate.
引用
收藏
页码:7863 / 7877
页数:14
相关论文
共 50 条
  • [31] Detecting Adversarial Examples Utilizing Pixel Value Diversity
    Dong, Jinxin
    Zhou, Pingqiang
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [32] Detecting Adversarial Examples - A Lesson from Multimedia Security
    Schoettle, Pascal
    Schloegl, Alexander
    Pasquini, Cecilia
    Boehme, Rainer
    2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 947 - 951
  • [33] Detecting Operational Adversarial Examples for Reliable Deep Learning
    Zhao, Xingyu
    Huang, Wei
    Schewe, Sven
    Dong, Yi
    Huang, Xiaowei
    51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOL (DSN 2021), 2021, : 5 - 6
  • [34] On the generation of adversarial examples for image quality assessment
    Sang, Qingbing
    Zhang, Hongguo
    Liu, Lixiong
    Wu, Xiaojun
    Bovik, Alan C.
    VISUAL COMPUTER, 2024, 40 (05): : 3183 - 3198
  • [35] ADVERSARIAL EXAMPLES FOR IMAGE CROPPING IN SOCIAL MEDIA
    Yoshida, Masatomo
    Okuda, Masahiro
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4898 - 4902
  • [36] ADVERSARIAL EXAMPLES DETECTION BEYOND IMAGE SPACE
    Chen, Kejiang
    Chen, Yuefeng
    Zhou, Hang
    Qin, Chuan
    Mao, Xiaofeng
    Zhang, Weiming
    Yu, Nenghai
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 3850 - 3854
  • [37] On the generation of adversarial examples for image quality assessment
    Qingbing Sang
    Hongguo Zhang
    Lixiong Liu
    Xiaojun Wu
    Alan C. Bovik
    The Visual Computer, 2024, 40 : 3183 - 3198
  • [38] Evaluating Impact of Image Transformations on Adversarial Examples
    Tian, Pu
    Poreddy, Sathvik
    Danda, Charitha
    Gowrineni, Chihnita
    Wu, Yalong
    Liao, Weixian
    IEEE ACCESS, 2024, 12 : 186217 - 186228
  • [39] MirGAN: Medical Image Reconstruction using Generative Adversarial Networks
    Dang, Nitin
    Khurana, Manju
    Tiwari, Shailendra
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [40] A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples
    Zeng, Qiang
    Su, Jianhai
    Fu, Chenglong
    Kayas, Golam
    Luo, Lannan
    Du, Xiaojiang
    Tan, Chiu C.
    Wu, Jie
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 39 - 51