• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Jiang, Mengxi (Jiang, Mengxi.) [1] | Sui, Yulei (Sui, Yulei.) [2] | Lei, Yunqi (Lei, Yunqi.) [3] | Xie, Xiaofei (Xie, Xiaofei.) [4] | Li, Cuihua (Li, Cuihua.) [5] | Liu, Yang (Liu, Yang.) [6] | Tsang, Ivor W. (Tsang, Ivor W..) [7]

Indexed by:

EI Scopus SCIE

Abstract:

Adversarial attack is a crucial step when evaluating the reliability and robustness of deep neural networks (DNNs) models. Most existing attack approaches apply an end-to-end gradient update strategy to generate adversarial examples for a classification or regression problem. However, few of them consider the non-differentiable DNN models (e.g., coordinate regression model) that prevent end-to-end backpropagation resulting in the failure gradient calculation. In this article, we present a new adversarial example generation approach for both untargeted and targeted attacks on coordinate regression models with non-differentiable operations. The novelty of our approach lies in a k- layer penetrating representation, on which we perturb the hidden feature distribution of the k th layer through relational guidance to influence the final output, in which end-to-end backpropagation not required. Rather than modifying a large portion of the pixels in an image, the proposed approach only modifies a very small set of the input pixels. These pixels are carefully and precisely selected by three correlations between the input pixels and hidden features of the k th layer of a DNN, thus significantly reducing the adversarial perturbation on a clean image. We successfully apply the proposed approach to two different tasks (i.e., 2D and 3D human pose estimation) which are typical applications of the coordinate regression learning. The comprehensive experiments demonstrate that our approach achieves better performance while using much less adversarial perturbation on clean images.

Keyword:

adversarial attack Adversarial learning Artificial neural networks Backpropagation Computational modeling coordinate regression Numerical models Perturbation methods pose estimation Robustness Task analysis

Community:

  • [ 1 ] [Jiang, Mengxi]Fuzhou Univ, Sch Adv Mfg, Fuzhou 350025, Peoples R China
  • [ 2 ] [Sui, Yulei]Univ New South Wales, Sydney, NSW 2052, Australia
  • [ 3 ] [Lei, Yunqi]Xiamen Univ, Dept Comp Sci, Xiamen 361005, Peoples R China
  • [ 4 ] [Li, Cuihua]Xiamen Univ, Dept Comp Sci, Xiamen 361005, Peoples R China
  • [ 5 ] [Xie, Xiaofei]Singapore Management Univ, Sch Comp & Informat Syst, Singapore 188065, Singapore
  • [ 6 ] [Liu, Yang]Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
  • [ 7 ] [Tsang, Ivor W.]Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
  • [ 8 ] [Tsang, Ivor W.]Agcy Sci Technol & Res, Ctr Frontier AI Res, Singapore 138632, Singapore
  • [ 9 ] [Tsang, Ivor W.]Agcy Sci Technol & Res, Inst High Performance Comp, Singapore 138632, Singapore
  • [ 10 ] [Tsang, Ivor W.]Univ Technol Sydney, Australian AI Inst, Sydney, NSW 2007, Australia

Reprint 's Address:

  • [Sui, Yulei]Univ New South Wales, Sydney, NSW 2052, Australia

Show more details

Version:

Related Keywords:

Source :

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING

ISSN: 1545-5971

Year: 2024

Issue: 6

Volume: 21

Page: 5538-5552

7 . 0 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Online/Total:1286/9730009
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1