IDEAS home Printed from https://ideas.repec.org/a/hin/jnddns/6124895.html
   My bibliography  Save this article

Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation

Author

Listed:
  • Feng Li
  • Xuehui Du
  • Liu Zhang
  • Ahmed Farouk

Abstract

Adversarial examples in an image classification task cause neural networks to predict incorrect class labels with high confidence. Many applications related to image classification, such as self-driving and facial recognition, have been seriously threatened by adversarial attacks. One class of the existing defense methods is the preprocessing-based defense which transforms the inputs before feeding them to the system. These methods are independent of the classification models and have excellent defensive effects under oblivious attacks. An image filtering method is often used to evaluate the robustness of adversarial examples. However, filtering induces the loss of valuable features that reduce the classification accuracy and weakens the adversarial perturbation. Furthermore, the fixed filtering parameters cannot effectively defend against the adversarial attack. This paper proposes a novel defense method based on different filter parameters and randomly rotated filtered images. The output classification probabilities are statistically averaged, which keeps the classification accuracy while removing the perturbation. Experimental results show that the proposed method improves the defense capability of various models against diverse kinds of oblivious adversarial attacks. Under the adaptive attack, the transferability of the adversarial examples among different models is significantly reduced.

Suggested Citation

  • Feng Li & Xuehui Du & Liu Zhang & Ahmed Farouk, 2021. "Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation," Discrete Dynamics in Nature and Society, Hindawi, vol. 2021, pages 1-11, December.
  • Handle: RePEc:hin:jnddns:6124895
    DOI: 10.1155/2021/6124895
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/ddns/2021/6124895.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/ddns/2021/6124895.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2021/6124895?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:jnddns:6124895. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.