LanCeX: A Versatile and Lightweight Defense Method against Condensed Adversarial Attacks in Image and Audio Recognition
Abstract
1 Introduction
2 Background and Related Works
2.1 Condensed Adversarial Attacks
2.2 Condensed Adversarial Attack Defense
3 Interpretation-oriented Condensed Adversarial Attacks Analysis
3.1 CNN Vulnerability Interpretation
3.2 Attack Process Analysis with Attention Mechanism
3.3 Inference Inconsistency between Condensed Adversarial Attack and Natural Input Recognition
4 LanCeX Defense Methodology
4.1 Self-Detection for Condensed Adversarial Attack
4.2 Adversarial Input Mitigation via Data Recovery
4.3 Computational Complexity Analysis
5 Scenario 1: Defense Against Condensed Adversarial Attacks in Image Classification
5.1 Defense Process in Image Classification
5.2 Computational Complexity Analysis
6 Scenario 2: Defense Against Condensed Adversarial Attack in Object Detection
6.1 Defense Process in Object Detection
6.2 Computational Complexity Analysis
7 Scenario 3: Defense Against Condensed Adversarial Attack in Audio Recognition
7.1 Defense Process in Audio Recognition
7.2 Computational Complexity Analysis
8 Experiment and Evaluation
8.1 Defense Evaluation for Image Classification
Setting | Inception-V3 | VGG-16 | ResNet-18 |
---|---|---|---|
Medium and random | 91% | 90% | 89% |
medium and fixed | 93% | 92% | 92% |
Small and random | 85% | 83% | 82% |
Large and random | 94% | 91% | 92% |
Inception-V3 | VGG-16 | ResNet-18 | ||||
---|---|---|---|---|---|---|
Acc | Time | Acc | Time | Acc | Time | |
Original | 9.8% | N/A | 9.5% | N/A | 9.8% | N/A |
PM [12] | 88.1% | 233 ms | 88.7% | 315 ms | 90.3% | 461 ms |
PatchGuard [44] | 86.8% | 203 ms | 90.1% | 220 ms | 89.6% | 338 ms |
LanCeX(Zero Mask) | 88.5% | 188 ms | 87.6% | 233 ms | 89.5% | 315 ms |
LanCeX(Telea) | 91.2% | 211 ms | 91.8% | 268 ms | 91.3% | 357 ms |
8.2 Defense Evaluation for Object Detection
Attacked | Information-based [50] | LanCeX | ||||
---|---|---|---|---|---|---|
Tar | Untar | Tar | Untar | Tar | Untar | |
Detection (\(R_d\)%) | - | - | 79 | 80 | 83 | 86 |
Recovery (mAP) | 1.24 | 0.07 | 56.11 | 56.23 | 58.92 | 58.23 |
Time Cost (ms) | - | - | 455 | 461 | 321 | 328 |
8.3 Defense Evaluation for Audio Recognition
FGSM | BIM | CW | Genetic | |
---|---|---|---|---|
Dependency [6] | 91% | 89% | 90% | 88% |
LanCeX | 96% | 94% | 93% | 91% |
9 Conclusion
Footnotes
References
Index Terms
- LanCeX: A Versatile and Lightweight Defense Method against Condensed Adversarial Attacks in Image and Audio Recognition
Recommendations
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System
Information Security and CryptologyAbstractIn recent years, physical adversarial attacks have been placed an increasing emphasis. However, previous studies usually use a printer to physically realize adversarial perturbations, and such an attack scheme will meet inevitable disadvantages of ...
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder
AbstractAdversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition systems against adversarial attacks (evasion attacks), the use of autoencoders is proposed. Various attacks ...
Universal Physical Adversarial Attack via Background Image
Applied Cryptography and Network Security WorkshopsAbstractRecently, adversarial attacks against object detectors have become research hotspots in academia. However, digital adversarial attacks need to generate adversarial perturbation on digital images in a “pixel-wise” way, which is challenging to ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Refereed
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 1,146Total Downloads
- Downloads (Last 12 months)471
- Downloads (Last 6 weeks)53
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in