• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Jiang, M. (Jiang, M..) [1] | Sui, Y. (Sui, Y..) [2] | Lei, Y. (Lei, Y..) [3] | Xie, X. (Xie, X..) [4] | Li, C. (Li, C..) [5] | Liu, Y. (Liu, Y..) [6] | Tsang, I.W. (Tsang, I.W..) [7]

Indexed by:

Scopus

Abstract:

Adversarial attack is a crucial step when evaluating the reliability and robustness of deep neural networks (DNNs) models. Most existing attack approaches apply an end-to-end gradient update strategy to generate adversarial examples for a classification or regression problem. However, few of them consider the non-differentiable DNN models (e.g., coordinate regression model) that prevent end-to-end backpropagation resulting in the failure of gradient calculation. In this paper, we present a new adversarial example generation approach for both untargeted and targeted attacks on coordinate regression models with non-differentiable operations. The novelty of our approach lies in a k-layer penetrating representation, on which we perturb the hidden feature distribution of the k-th layer through relational guidance to influence the final output, in which end-to-end backpropagation is not required. Rather than modifying a large portion of the pixels in an image, the proposed approach only modifies a very small set of the input pixels. These pixels are carefully and precisely selected by three correlations between the input pixels and hidden features of the k-th layer of a DNN, thus significantly reducing the adversarial perturbation on a clean image. We successfully apply the proposed approach to two different tasks (i.e., 2D and 3D human pose estimation) which are typical applications of the coordinate regression learning. The comprehensive experiments demonstrate that our approach achieves better performance while using much less adversarial perturbation on clean images. IEEE

Keyword:

Artificial neural networks Backpropagation Computational modeling Numerical models Perturbation methods Robustness Task analysis

Community:

  • [ 1 ] [Jiang M.]School of Advanced Manufacturing, Fuzhou University, China
  • [ 2 ] [Sui Y.]University of New South Wales, Australia
  • [ 3 ] [Lei Y.]Department of Computer Science, Xiamen University, China
  • [ 4 ] [Xie X.]School of Computing and Information Systems, Singapore Management University, Singapore
  • [ 5 ] [Li C.]Department of Computer Science, Xiamen University, China
  • [ 6 ] [Liu Y.]School of Computer Science and Engineering, Nanyang Technological University, Singapore
  • [ 7 ] [Tsang I.W.]Centre for Frontier AI Research, A*STAR, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2024

Issue: 6

Volume: 21

Page: 1-15

7 . 0 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Online/Total:613/9742777
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1