A Data-driven Adversarial Examples Recognition Framework via Adversarial Feature Genome

December 25, 2018 · Declared Dead · 🏛 International Journal of Intelligent Systems

⚰️ CAUSE OF DEATH: The Empty Tomb
GitHub repo is empty
Authors Li Chen, Qi Li, Weiye Chen, Zeyu Wang, Haifeng Li arXiv ID 1812.10085 Category cs.CV: Computer Vision Citations 4 Venue International Journal of Intelligent Systems Repository https://github.com/GeoX-Lab/Adv_Fea_Genome Last Checked 1 month ago
Abstract
Adversarial examples pose many security threats to convolutional neural networks (CNNs). Most defense algorithms prevent these threats by finding differences between the original images and adversarial examples. However, the found differences do not contain features about the classes, so these defense algorithms can only detect adversarial examples without recovering the correct labels. In this regard, we propose the Adversarial Feature Genome (AFG), a novel type of data that contains both the differences and features about classes. This method is inspired by an observed phenomenon, namely the Adversarial Feature Separability (AFS), where the difference between the feature maps of the original images and adversarial examples becomes larger with deeper layers. On top of that, we further develop an adversarial example recognition framework that detects adversarial examples and can recover the correct labels. In the experiments, the detection and classification of adversarial examples by AFGs has an accuracy of more than 90.01\% in various attack scenarios. To the best of our knowledge, our method is the first method that focuses on both attack detecting and recovering. AFG gives a new data-driven perspective to improve the robustness of CNNs. The source code is available at https://github.com/GeoX-Lab/Adv_Fea_Genome.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

📜 Similar Papers

In the same crypt — Computer Vision

Died the same way — ⚰️ The Empty Tomb