2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019
DOI: 10.1109/cvpr.2019.00491
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Defense Through Network Profiling Based Path Extraction

Abstract: Recently, researchers have started decomposing deep neural network models according to their semantics or functions. Recent work has shown the effectiveness of decomposed functional blocks for defending adversarial attacks, which add small input perturbation to the input image to fool the DNN models. This work proposes a profiling-based method to decompose the DNN models to different functional blocks, which lead to the effective path as a new approach to exploring DNNs' internal organization. Specifically, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 47 publications
(29 citation statements)
references
References 17 publications
0
29
0
Order By: Relevance
“…Later, they detect adversarial examples by identifying inconsistencies between the original and the attribute-steered models. In [390], the authors proposed a mechanism to trace the activation paths of clean and adversarial images and detect adversarial perturbations based on the different characteristics of these paths. Liu et al [391] proposed to detect adversarial examples by analysing inputs from steganography point of view.…”
Section: B Detection For Defensementioning
confidence: 99%
“…Later, they detect adversarial examples by identifying inconsistencies between the original and the attribute-steered models. In [390], the authors proposed a mechanism to trace the activation paths of clean and adversarial images and detect adversarial perturbations based on the different characteristics of these paths. Liu et al [391] proposed to detect adversarial examples by analysing inputs from steganography point of view.…”
Section: B Detection For Defensementioning
confidence: 99%
“…FeatureMap is a naive baseline that uses the feature maps of convolutional layers as the inputs of the classifier. EffectivePath is a more advanced baseline that uses the effective path generated by Qiu et al [57] to train the classifier. The experiments were conducted on ResNet10 and the CIFAR-10 dataset (image size 32×32).…”
Section: Discussionmentioning
confidence: 99%
“…With such taxonomy, we further apply analytic experiments to explore the function of each behavior according to distance. We are also looking forward to further analysis the behavior and function of variant patterns with probing task datasets (Conneau et al, 2018) and analytic tools (Qiu et al, 2019;Gan et al, 2020) as our next plan. Besides, there are several recent works focusing on the optimization of over-parameterized MHA mechanism (Michel et al, 2019;Kovaleva et al, 2019;.…”
Section: Discussionmentioning
confidence: 99%