2022
DOI: 10.3390/jimaging8020038
|View full text |Cite
|
Sign up to set email alerts
|

Natural Images Allow Universal Adversarial Attacks on Medical Image Classification Using Deep Neural Networks with Transfer Learning

Abstract: Transfer learning from natural images is used in deep neural networks (DNNs) for medical image classification to achieve a computer-aided clinical diagnosis. Although the adversarial vulnerability of DNNs hinders practical applications owing to the high stakes of diagnosis, adversarial attacks are expected to be limited because training datasets (medical images), which are often required for adversarial attacks, are generally unavailable in terms of security and privacy preservation. Nevertheless, in this stud… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…In order to achieve a better performance, we introduce an integrated deep learning model (InRes-106) by combining InceptionV3 and ResNet50 as a DCNN model because it can be assumed that the fine-tuning InceptionV3 and ResNet50 model architectures respond well to the medical images [ 44 ]. The advantage of DCNN is that a high accuracy can be achieved through multiple levels and an automated feature extraction process [ 45 ].…”
Section: Methodsmentioning
confidence: 99%
“…In order to achieve a better performance, we introduce an integrated deep learning model (InRes-106) by combining InceptionV3 and ResNet50 as a DCNN model because it can be assumed that the fine-tuning InceptionV3 and ResNet50 model architectures respond well to the medical images [ 44 ]. The advantage of DCNN is that a high accuracy can be achieved through multiple levels and an automated feature extraction process [ 45 ].…”
Section: Methodsmentioning
confidence: 99%
“…Such papers [38,46,48] investigated attacks to fool the segmentation task using UNet 3 to generate perturbed masks. In the classification task, papers [35] and [41][42][43][44] employed the FGSM attack, [35,41,44] the PGD attack, [39,40] the UAP attack, [37] the One Pixel attack, and [46,48,60] GANs-based attack. As far as DeepFake attacks are concerned, which generate fake data, e.g., inserting a malign tumor into a medical image that is supposed to be benign.…”
Section: Highlighted Strategies Of Security In Machine Learning For H...mentioning
confidence: 99%
“…Repair network and optimization network (RNON) is an efficient image in painting method consisting of two mutually independent generative adversarial networks, with one network functioning as an image in painting network and the other as an image optimization network [26]. Therefore, it can be widely used in many fields such as image segmentation [27,28], image classification [29,30], and so on [31][32][33].…”
Section: Introductionmentioning
confidence: 99%