Image recognition: Defense adversarial attacks

Slides:



Advertisements
Similar presentations
1 Image Classification MSc Image Processing Assignment March 2003.
Advertisements

Image classification Given the bag-of-features representations of images from different classes, how do we learn a model for distinguishing them?
SVM - Support Vector Machines A new classification method for both linear and nonlinear data It uses a nonlinear mapping to transform the original training.
An Introduction of Support Vector Machine
SVM—Support Vector Machines
CSCI 347 / CS 4206: Data Mining Module 07: Implementations Topic 03: Linear Models.
Self Organization of a Massive Document Collection
ENN: Extended Nearest Neighbor Method for Pattern Recognition
July 11, 2001Daniel Whiteson Support Vector Machines: Get more Higgs out of your data Daniel Whiteson UC Berkeley.
Hurieh Khalajzadeh Mohammad Mansouri Mohammad Teshnehlab
1 SUPPORT VECTOR MACHINES İsmail GÜNEŞ. 2 What is SVM? A new generation learning system. A new generation learning system. Based on recent advances in.
SVM Support Vector Machines Presented by: Anas Assiri Supervisor Prof. Dr. Mohamed Batouche.
Learning to perceive how hand-written digits were drawn Geoffrey Hinton Canadian Institute for Advanced Research and University of Toronto.
Nonlinear Data Discrimination via Generalized Support Vector Machines David R. Musicant and Olvi L. Mangasarian University of Wisconsin - Madison
Machines that Make Decisions Instructor: Edmondo Trentin
Feature selection with Neural Networks Dmitrij Lagutin, T Variable Selection for Regression
Ohad Hageby IDC Support Vector Machines & Kernel Machines IP Seminar 2008 IDC Herzliya.
Graphing a Linear Inequality
Classification Course web page: vision.cis.udel.edu/~cv May 14, 2003  Lecture 34.
Feature Selction for SVMs J. Weston et al., NIPS 2000 오장민 (2000/01/04) Second reference : Mark A. Holl, Correlation-based Feature Selection for Machine.
Foundational Issues Machine Learning 726 Simon Fraser University.
Extending linear models by transformation (section 3.4 in text) (lectures 3&4 on amlbook.com)
Support Vector Machine Slides from Andrew Moore and Mingyue Tan.
Conditional Generative Adversarial Networks
Big data classification using neural network
CSSE463: Image Recognition Day 14
Generative Adversarial Nets
Semi-Supervised Clustering
Deep Neural Net Scenery Generation
Data Mining, Neural Network and Genetic Programming
Neural Networks.
Intro to Machine Learning
Classification: Logistic Regression
Table 1. Advantages and Disadvantages of Traditional DM/ML Methods
Generative Adversarial Networks
Discriminative Training of Chow-Liu tree Multinet Classifiers
Chapter 12 Object Recognition
Chaoyun Zhang, Xi Ouyang, and Paul Patras
Machine Learning Dr. Mohamed Farouk.
Generative adversarial networks (GANs) for edge detection
Authors: Jun-Yan Zhu*, Taesun Park*, Phillip Isola, Alexei A. Efros
"Playing Atari with deep reinforcement learning."
Low Dose CT Image Denoising Using WGAN and Perceptual Loss
Face detection using Random projections
Distributed Representation of Words, Sentences and Paragraphs
Intro to Machine Learning
Stealing DNN models: Attacks and Defenses
Optimization for Fully Connected Neural Network for FPGA application
Pattern Recognition and Machine Learning
Image to Image Translation using GANs
GAN Applications.
Michael R. Bristow et al. BTS 2018;3:1-8
Source: Pattern Recognition Vol. 38, May, 2005, pp
Mathematical Foundations of BME
Machine learning overview
Zhedong Zheng, Liang Zheng and Yi Yang
Textual Video Prediction
Course Recap and What’s Next?
Abnormally Detection
Introduction.
Ch 14. Generative adversarial networks (GANs) for edge detection
Derek Hoiem CS 598, Spring 2009 Jan 27, 2009
Fig. 7 LSH database and similarity search example.
Volume 74, Issue 1, Pages (April 2012)
Adversarial Personalized Ranking for Recommendation
Angel A. Cantu, Nami Akazawa Department of Computer Science
End-to-End Facial Alignment and Recognition
Cengizhan Can Phoebe de Nooijer
Generative adversarial networks (GANs)
Developments in Adversarial Machine Learning
Presentation transcript:

Image recognition: Defense adversarial attacks using Generative Adversarial Network (GAN) Speaker: Guofei Pang Division of Applied Mathematics Brown University Presentation after reading the paper: Ilyas, Andrew, et al. "The Robust Manifold Defense: Adversarial Training using Generative Models." arXiv preprint arXiv:1712.09196 (2017).

Generative Adversarial Network (GAN) How to defense attacks using GAN Outline Adversarial attacks Generative Adversarial Network (GAN) How to defense attacks using GAN Numerical results 2/25

Adversarial Attacks 3/25

Adversarial Attacks 4/25

n = m n*m Adversarial Attacks 𝐈𝐦𝐚𝐠𝐞 𝐚𝐬 𝐚 𝐯𝐞𝐜𝐭𝐨𝐫: 𝐱= 𝐱𝐣 , 𝐣=𝟏,𝟐,…,𝐧∗𝐦 𝐱= 𝐱𝐣 , 𝐣=𝟏,𝟐,…,𝐧∗𝐦 m n*m 5/25

Adversarial examples for a classifier C(): A pair of input x1 and x2 Adversarial Attacks 𝐱𝟏 𝐱𝟐 𝐱𝟏−𝐱𝟐 𝟐<𝐞𝟎 𝐂(𝐱𝟏)−𝐂(𝐱𝟐) >𝐟𝟎 Adversarial examples for a classifier C(): A pair of input x1 and x2 A person says they are of the same class But a classifier will they are completely different! 6/25

Why does classifier become fool for these examples? Adversarial Attacks Why does classifier become fool for these examples? 7/25

Why does classifier become fool for these examples? Adversarial Attacks Why does classifier become fool for these examples? An intuition from the authors: Natural image: Low-dimensional manifold Noisy image: High-dimensional manifold High dimensionality is tough for classifier. 8/25

Generative adversarial network (GAN) x and x’ have similar PDF G() has learned the underlying distribution of image dataset after training GAN The DNN G() is a nonlinear mapping from low-dimensional space, z, to high-dimensional space, x’ Original image x Synthetic image /Generative model x’=G(z) GAN Generator G(z) Noisy input z, say, z – N(0,I) 9/25

Convergence state: pdata(x)=pG(x) Generative adversarial network (GAN) Convergence state: pdata(x)=pG(x) Green solid line: probability density function (PDF) of the generator G() Black dotted line: PDF of original image x, i.e., pdata(x) Blue dash line: PDF of discriminator D() 10/25

Generative adversarial network (GAN) 11/25

Invert and Classify How to defense attacks using GAN G() is pre-trained and has learned the underlying distribution of the training (image) dataset after training GAN Invert and Classify Synthetic image x’=G(z*) (Preserve low-dimensional manifold) Classifier C() Original image x (Could include high-dimensional manifold when noise enters) 12/25

Enhanced Invert and Classify How to defense attacks using GAN G() is pre-trained and has learned the underlying distribution of the training (image) dataset after training GAN Enhanced Invert and Classify Synthetic image x’=G(z*) (Preserve low-dimensional manifold) Classifier C() (retrain the classifier) Upper bound of attack magnitude Classification loss 13/25

First-order classifier attacks for handwritten digit classification Numerical results First-order classifier attacks for handwritten digit classification 14/25

First-order classifier attacks for handwritten digit classification Numerical results First-order classifier attacks for handwritten digit classification 15/25

First-order classifier attacks for handwritten digit classification Numerical results First-order classifier attacks for handwritten digit classification 16/25

First-order classifier attacks for gender classification Numerical results First-order classifier attacks for gender classification 17/25

First-order classifier attacks for gender classification Numerical results First-order classifier attacks for gender classification 18/25

Substitute model attacks Numerical results Substitute model attacks Results from Invert and Classify 19/25

Invert and Classify and Enhanced Invert and Classify Numerical results Comparison between Invert and Classify and Enhanced Invert and Classify 20/25

Numerical results 21/25

Numerical results 22/25

Numerical results 23/25

Numerical results 24/25

GAN for regression problems? GAN versus other neural networks? Thinking GAN for regression problems? GAN versus other neural networks? One defense strategy for all types of attacks? 25/25