Visible to the public Enhancing Resilience of Deep Learning Networks By Means of Transferable Adversaries

TitleEnhancing Resilience of Deep Learning Networks By Means of Transferable Adversaries
Publication TypeConference Paper
Year of Publication2020
AuthorsSeiler, M., Trautmann, H., Kerschke, P.
Conference Name2020 International Joint Conference on Neural Networks (IJCNN)
Date PublishedJuly 2020
PublisherIEEE
ISBN Number978-1-7281-6926-2
KeywordsAdversarial training, Adversary Models, Artificial neural networks, classification decision model, Deep Learning, deep learning networks, defense methods, Human Behavior, Information systems, learning (artificial intelligence), machine learning, Metrics, Multi-step Adversaries, neural nets, Neural networks, pattern classification, Perturbation methods, pubcrawl, resilience, resilience enhancement, Resiliency, Scalability, security of data, single-step adversaries, Task Analysis, Training, transferable adversaries
Abstract

Artificial neural networks in general and deep learning networks in particular established themselves as popular and powerful machine learning algorithms. While the often tremendous sizes of these networks are beneficial when solving complex tasks, the tremendous number of parameters also causes such networks to be vulnerable to malicious behavior such as adversarial perturbations. These perturbations can change a model's classification decision. Moreover, while single-step adversaries can easily be transferred from network to network, the transfer of more powerful multi-step adversaries has - usually - been rather difficult.In this work, we introduce a method for generating strong adversaries that can easily (and frequently) be transferred between different models. This method is then used to generate a large set of adversaries, based on which the effects of selected defense methods are experimentally assessed. At last, we introduce a novel, simple, yet effective approach to enhance the resilience of neural networks against adversaries and benchmark it against established defense methods. In contrast to the already existing methods, our proposed defense approach is much more efficient as it only requires a single additional forward-pass to achieve comparable performance results.

URLhttps://ieeexplore.ieee.org/document/9207338
DOI10.1109/IJCNN48605.2020.9207338
Citation Keyseiler_enhancing_2020