1. Deep neural rejection against adversarial examples
- Author
-
Fabio Roli, Marco Melis, Ambra Demontis, Angelo Sotgiu, Giorgio Fumera, Xiaoyi Feng, and Battista Biggio
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,lcsh:Computer engineering. Computer hardware ,Computer science ,Computer Vision and Pattern Recognition (cs.CV) ,Training time ,Adversarial machine Learning ,Deep neural network ,Adversarial examples ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Learning ,68T45 ,lcsh:TK7885-7895 ,02 engineering and technology ,Adversarial machine learning ,Machine learning ,computer.software_genre ,lcsh:QA75.5-76.95 ,Machine Learning (cs.LG) ,Adversarial system ,020204 information systems ,Deep neural networks ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,Representation (mathematics) ,business.industry ,Network layer ,Computer Science Applications ,Signal Processing ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electronic computers. Computer science ,business ,computer - Abstract
Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, based on the idea of rejecting samples that exhibit anomalous feature representations at different network layers. With respect to competing approaches, our method does not require generating adversarial examples at training time, and it is less computationally demanding. To properly evaluate our method, we define an adaptive white-box attack that is aware of the defense mechanism and aims to bypass it. Under this worst-case setting, we empirically show that our approach outperforms previously proposed methods that detect adversarial examples by only analyzing the feature representation provided by the output network layer.
- Published
- 2020
- Full Text
- View/download PDF