Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine Transformations

07/10/2019
by   Rohan Reddy Mekala, et al.
4

Adversarial attacks are small, carefully crafted perturbations, imperceptible to the naked eye; that when added to an image cause deep learning models to misclassify the image with potentially detrimental outcomes. With the rise of artificial intelligence models in consumer safety and security intensive industries such as self-driving cars, camera surveillance and face recognition, there is a growing need for guarding against adversarial attacks. In this paper, we present an approach that uses metamorphic testing principles to automatically detect such adversarial attacks. The approach can detect image manipulations that are so small, that they are impossible to detect by a human through visual inspection. By applying metamorphic relations based on distance ratio preserving affine image transformations which compare the behavior of the original and transformed image; we show that our proposed approach can determine whether or not the input image is adversarial with a high degree of accuracy.

READ FULL TEXT

page 1

page 4

research
01/02/2018

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey

Deep learning is at the heart of the current rise of machine learning an...
research
12/18/2019

Detecting Adversarial Attacks On Audio-Visual Speech Recognition

Adversarial attacks pose a threat to deep learning models. However, rese...
research
06/02/2023

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations

Adversarial attacks reveal serious flaws in deep learning models. More d...
research
09/13/2021

Improving Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator

Adversarial examples can deceive a deep neural network (DNN) by signific...
research
05/01/2023

Physical Adversarial Attacks for Surveillance: A Survey

Modern automated surveillance techniques are heavily reliant on deep lea...
research
12/23/2020

Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks

Network attacks have become a major security concern for organizations w...
research
06/17/2020

Adversarial Defense by Latent Style Transformations

Machine learning models have demonstrated vulnerability to adversarial a...

Please sign up or login with your details

Forgot password? Click here to reset