• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Sinkhorn对抗攻击与防御

Sinkhorn Adversarial Attack and Defense.

作者信息

Subramanyam A V

出版信息

IEEE Trans Image Process. 2022;31:4039-4049. doi: 10.1109/TIP.2022.3180207. Epub 2022 Jun 14.

DOI:10.1109/TIP.2022.3180207
PMID:35679377
Abstract

Adversarial attacks have been extensively investigated in the recent past. Quite interestingly, a majority of these attacks primarily work in the l space. In this work, we propose a novel approach for generating adversarial samples using Wasserstein distance. Unlike previous approaches, we use an unbalanced optimal transport formulation which is naturally suited for images. We first compute an adversarial sample using a gradient step and then project the resultant image into Wasserstein ball with respect to original sample. The attack introduces perturbation in the form of pixel mass distribution which is guided by a cost metric. Elaborate experiments on MNIST, Fashion-MNIST, CIFAR-10 and Tiny ImageNet demonstrate a sharp decrease in the performance of state-of-art classifiers. We also perform experiments with adversarially trained classifiers and show that our system achieves superior performance in terms of adversarial defense against several state-of-art attacks. Our code and pre-trained models are available at https://bit.ly/2SQBR4E.

摘要

最近,对抗攻击受到了广泛研究。非常有趣的是,这些攻击中的大多数主要在l空间中起作用。在这项工作中,我们提出了一种使用瓦瑟斯坦距离生成对抗样本的新方法。与以前的方法不同,我们使用一种自然适用于图像的不平衡最优传输公式。我们首先使用梯度步长计算一个对抗样本,然后将所得图像相对于原始样本投影到瓦瑟斯坦球中。该攻击以像素质量分布的形式引入扰动,该扰动由成本度量引导。在MNIST、Fashion-MNIST、CIFAR-10和Tiny ImageNet上进行的详细实验表明,最先进分类器的性能急剧下降。我们还对经过对抗训练的分类器进行了实验,并表明我们的系统在针对几种最先进攻击的对抗防御方面取得了卓越的性能。我们的代码和预训练模型可在https://bit.ly/2SQBR4E上获取。

相似文献

1
Sinkhorn Adversarial Attack and Defense.Sinkhorn对抗攻击与防御
IEEE Trans Image Process. 2022;31:4039-4049. doi: 10.1109/TIP.2022.3180207. Epub 2022 Jun 14.
2
Privacy Preserving Defense For Black Box Classifiers Against On-Line Adversarial Attacks.隐私保护的黑盒分类器对抗在线对抗攻击。
IEEE Trans Pattern Anal Mach Intell. 2022 Dec;44(12):9503-9520. doi: 10.1109/TPAMI.2021.3125931. Epub 2022 Nov 7.
3
Defense against adversarial attacks based on color space transformation.基于颜色空间变换的对抗攻击防御。
Neural Netw. 2024 May;173:106176. doi: 10.1016/j.neunet.2024.106176. Epub 2024 Feb 14.
4
Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.增强视频识别模型的鲁棒性:稀疏对抗攻击及其他。
Neural Netw. 2024 Mar;171:127-143. doi: 10.1016/j.neunet.2023.11.056. Epub 2023 Nov 25.
5
Adversarial Attack and Defense in Deep Ranking.深度排序中的对抗攻击与防御
IEEE Trans Pattern Anal Mach Intell. 2024 Aug;46(8):5306-5324. doi: 10.1109/TPAMI.2024.3365699. Epub 2024 Jul 2.
6
ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.ABC攻击:一种用于欺骗深度图像分类器的无梯度优化黑盒攻击。
Entropy (Basel). 2022 Mar 15;24(3):412. doi: 10.3390/e24030412.
7
Towards Adversarial Robustness for Multi-Mode Data through Metric Learning.通过度量学习实现多模态数据的对抗鲁棒性。
Sensors (Basel). 2023 Jul 5;23(13):6173. doi: 10.3390/s23136173.
8
Crafting Adversarial Perturbations via Transformed Image Component Swapping.通过变换图像组件交换来生成对抗性扰动
IEEE Trans Image Process. 2022;31:7338-7349. doi: 10.1109/TIP.2022.3204206. Epub 2022 Nov 30.
9
DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector.DAMAD:数据库、攻击与模型无关的对抗扰动检测器。
IEEE Trans Neural Netw Learn Syst. 2022 Aug;33(8):3277-3289. doi: 10.1109/TNNLS.2021.3051529. Epub 2022 Aug 3.
10
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.双流:通过流场和基于归一化流的模型生成不可察觉的对抗样本。
Front Neurorobot. 2023 Feb 9;17:1129720. doi: 10.3389/fnbot.2023.1129720. eCollection 2023.