작성일
2022.04.05
수정일
2022.04.05
작성자
최석환
조회수
120

Robust Defense Techniques against Adversarial Examples for Image-based Deep Learning Models

As a core part of current real-world applications, image-based deep learning model has been widely applied in various fields. However, many studies showed that image-based deep learning model is very vulnerable to adversarial attacks. Here, the term “adversarial attack” represents to attacks that target a deep learning model by modifying legitimate input data with slight humanimperceptible perturbations. It is known that adversarial attacks cause severe damage to practical image-based deep learning models such as self-driving systems, face recognition system, and perceptual ad-blocking system. In this dissertation, we focus on robust defense techniques for imagebased deep learning model against adversarial attacks. To achieve this goal, we first propose two new defense methods against white-box adversarial attacks, each of which detects white-box adversarial attacks or provides robustness against white-box adversarial attacks to image-based deep learning models. Also, a new defense method, which detects black-box adversarial attacks based on perceptual image hashing, is proposed. Specifically, three remarkable results are obtained: 

 

1. Clustering Approach for Detecting White-box Adversarial Attacks: We note that current detection methods against white-box adversarial attacks can classify the input data into only either legitimate one or adversarial one. That is, the current detection methods can only detect the adversarial examples and can not classify the input data into multiple classes of data, i.e. legitimate input data and various types of adversarial attacks. To overcome this limitation of the current detection methods, we propose an advanced detection method which can detect white-box adversarial attacks while classifying the types of adversarial attacks. The proposed detection method extracts key features from adversarial perturbation and feeds the extracted features into the clustering model. From analysis results under various application datasets, we show that the proposed detection method can classify the types of adversarial attacks. We also show that the detection accuracy of the proposed detection method outperforms the accuracy of recent detection methods.

 

2. Two-Step Input Transformation for Defending against White-box Adversarial Attack: Previous defense methods against white-box adversarial attacks suffer from the accuracy degradation for legitimate input data. To solve the accuracy degradation for legitimate input data while keeping the target image-based deep learning models robust against adversarial examples, we propose two-step input transformation architecture. Based on the two-step input transformation architecture, we also propose two new defense methods according to the defender’s knowledge for the target model, which are called EEJE and ARGAN, respectively. From the experimental results under various conditions, we show that the proposed two-step input transformation architecture provides good robustness to image-based deep earning models against white-box adversarial attacks while maintaining the high accuracy even for legitimate input data. In addition, it is shown that EEJE and ARGAN provide better performance than the previous defense methods.

 

3. Perceptual Image Hashing for Defending against Black-box Adversarial Attacks, which is called PIHA (Perceptual Image HAshing): To defense black-box adversarial attacks, the state-of-the-art defense methods use similarity of input data. However, the robustness of those defense methods can be easily mitigated by the adversary. To solve this problem, we propose a new defense method, called PIHA, which uses the concept of perceptual image hashing. Given a query image, PIHA generates a hash sequence and compares the hash sequence with those of previous queries to detect black-box adversarial attacks. Here, a hash sequence has invariance to small perturbations and color changes when detecting black-box adversarial attacks. From the experimental results under various black-box adversarial attacks using the representative benchmark datasets, we show that PIHA provides the good performance in the number of detected attack queries and the detected query rate than the state-of-the-art defense methods, i.e., Stateful Detection and Blacklight.

 

The above three defense techniques described in this dissertation provide good robustness against all possible adversarial attack scenarios. Therefore, we can use image-based deep learning models with confidence from the threat of hostile attacks.

학위연월
2022년 8월
지도교수
최윤호
키워드
Adversarial attack, Deep Learning, Security
소개 웹페이지
https://sites.google.com/view/seokhwan-choi/home
첨부파일
첨부파일이(가) 없습니다.
다음글
DQN 기반 자동화 컨테이너 터미널 장치장 크레인 작업 할당 전략 최적화
김세영 2022-10-13 12:33:32.29
이전글
High-Performance Hardware Architectures for Elliptic Curve-Based Cryptographic Processor
아와루딘 에셉 무하마드 2022-04-01 17:48:36.81
RSS 2.0 116
게시물 검색
박사학위논문
번호 제목 작성자 작성일 첨부파일 조회수
116 Task-Specific Differential Private Data Publish Me 신진명 2024.04.09 0 21
115 Advanced Defense Framework against Physical Advers 김용수 2024.04.08 0 30
114 한글 채팅 텍스트 기반의 저자 검증 모형과 그 응용 이다영 2024.04.05 0 30
113 상태 기반 테스트 시나리오 보강 방법 이선열 2023.10.17 0 134
112 Manufacturing Testing Automation FrameworkBased on 강효은 2023.10.17 0 147
111 Synthesizing Robust Physical Camouflage for Univer 수랸토 나우팔 2023.10.16 0 151
110 복잡도 다양성을 고려한 C 프로그램의 시험 용이성 예측 모형 구축 방법 최현재 2023.10.16 0 122
109 Design and Optimization of Quantum Arithmetic Circ 라라사티 하라스타 타티마 2023.10.13 0 151
108 Improving 6TiSCH Network Formation and Transmissio 파와즈 자키 자키얄 2023.10.10 0 143
107 저지연 고신뢰 운전자 프로파일링을 위한 딥러닝 모델 및 조기 종료 기법 임재봉 2023.10.08 0 187
106 802.11ax 대규모 Wi-Fi 환경의 심층 생성 모델을 활용한 트래픽 모델링 및 AP 이재민 2023.04.07 0 115
105 뉴런 클러스터를 활용한 합성곱 신경망 이미지 분류 신뢰성 향상 방법 이영우 2023.04.06 0 106
104 Trust Guard Extension Framework for Enhanced Secur 김해용 2023.04.06 0 86
103 노이즈 오염 하에서의 효율적 최적화를 위한 확률적 평가 샘플 누적 전략 김정민 2023.04.06 1 115
102 LPWAN의 규모 확장성과 서비스 커버리지 향상을 위한 충돌 제어 및 신호 합성 기법 허준환 2022.10.13 0 114
101 DQN 기반 자동화 컨테이너 터미널 장치장 크레인 작업 할당 전략 최적화 김세영 2022.10.13 0 123
100 Robust Defense Techniques against Adversarial Exam 최석환 2022.04.05 0 121
99 High-Performance Hardware Architectures for Ellipt 아와루딘 에셉 무하마드 2022.04.01 0 90
98 한국어 자연어처리를 위한 뉴로-심볼릭 모델 김민호 2021.10.14 0 128
97 Automatic Assessment and Collaborative Mentoring S 류샤오 2021.10.13 0 130