• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Jiang, Mengxi (Jiang, Mengxi.) [1] | Sui, Yulei (Sui, Yulei.) [2] | Lei, Yunqi (Lei, Yunqi.) [3] | Xie, Xiaofei (Xie, Xiaofei.) [4] | Li, Cuihua (Li, Cuihua.) [5] | Liu, Yang (Liu, Yang.) [6] | Tsang, Ivor W. (Tsang, Ivor W..) [7]

Indexed by:

EI

Abstract:

Adversarial attack is a crucial step when evaluating the reliability and robustness of deep neural networks (DNNs) models. Most existing attack approaches apply an end-to-end gradient update strategy to generate adversarial examples for a classification or regression problem. However, few of them consider the non-differentiable DNN models (e.g., coordinate regression model) that prevent end-to-end backpropagation resulting in the failure of gradient calculation. In this article, we present a new adversarial example generation approach for both untargeted and targeted attacks on coordinate regression models with non-differentiable operations. The novelty of our approach lies in a kk-layer penetrating representation, on which we perturb the hidden feature distribution of the kkth layer through relational guidance to influence the final output, in which end-to-end backpropagation is not required. Rather than modifying a large portion of the pixels in an image, the proposed approach only modifies a very small set of the input pixels. These pixels are carefully and precisely selected by three correlations between the input pixels and hidden features of the kkth layer of a DNN, thus significantly reducing the adversarial perturbation on a clean image. We successfully apply the proposed approach to two different tasks (i.e., 2D and 3D human pose estimation) which are typical applications of the coordinate regression learning. The comprehensive experiments demonstrate that our approach achieves better performance while using much less adversarial perturbation on clean images. © 2004-2012 IEEE.

Keyword:

Air navigation Backpropagation Deep neural networks Multilayer neural networks Numerical methods Perturbation techniques Pixels Regression analysis

Community:

  • [ 1 ] [Jiang, Mengxi]Fuzhou University, School of Advanced Manufacturing, Fuzhou; 350025, China
  • [ 2 ] [Sui, Yulei]University of New South Wales, Sydney; NSW; 2052, Australia
  • [ 3 ] [Lei, Yunqi]Xiamen University, Department of Computer Science, Xiamen; 361005, China
  • [ 4 ] [Xie, Xiaofei]Singapore Management University, School of Computing and Information Systems, 188065, Singapore
  • [ 5 ] [Li, Cuihua]Xiamen University, Department of Computer Science, Xiamen; 361005, China
  • [ 6 ] [Liu, Yang]Nanyang Technological University, School of Computer Science and Engineering, 639798, Singapore
  • [ 7 ] [Tsang, Ivor W.]Agency for Science, Technology and Research, Institute of High Performance Computing, 138632, Singapore
  • [ 8 ] [Tsang, Ivor W.]Nanyang Technological University, School of Computer Science and Engineering, 639798, Singapore
  • [ 9 ] [Tsang, Ivor W.]University of Technology Sydney, Australian Ai Institute, NSW 2007, Australia

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2024

Issue: 6

Volume: 21

Page: 5538-5552

7 . 0 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:477/9741728
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1