SlideShare a Scribd company logo
1 of 17
Download to read offline
Transferable
Adversarial Perturbations
Bruce HOU 1
Wen ZHOU 1
Yongjun CHEN
Mengyun TANG
Bruce HOU Wen ZHOU
Yongjun CHEN Mengyun TANG
Team Honors
NIPS 2017 Competition:
Non-targeted Adversarial Attack ranking: 6/91
Defense Against Adversarial Attack ranking: 8/108
Publication:
Transferable Adversarial Perturbations: European
Conference on Computer Vision (ECCV 2018)
Transferable Perturbations
Transferability:
Maximizing the distance in the intermediate feature
maps
Robustness:
Introducing smooth regularization on adversarial
perturbations
Non-targeted Adversarial Attack
)),~(
||)),~((),((||
),~((maxarg),,,~(maxarg~
2
||~||||~||







i
si
Dd
xx
s
xx
wxxabsR
dxLTdxLT
txlwtxxJx
pp




|),~(|)),~(()),~(( dxLdxLsigndxLT 
3,5.0,16  s
)),~(
||)),~((),((||
),~((maxarg),,,~(maxarg~
2
||~||||~||







i
si
Dd
xx
s
xx
wxxabsR
dxLTdxLT
txlwtxxJx
pp



and
Optimization
initialize:
while i < k do:
end while
return
,0,/,~
0  ikxx 
)11)~((~ ,,-xx-signxclipx k 
)11))~((~(~
1 ,,, x, t,wxJsignεxclipx sixii 
VGG16 InceptionV3 InceptionV4
Inception
ResNet-V2
ResNet-V2 Ensemble
No perturbation 86.8% 96.4% 97.6% 100% 89.6% 99.8%
Random noise 81.3% 91.7% 94.6% 97.8% 84.5% 98.1%
VGG16-TAP
VGG16-FGSM
VGG16-IFGSM
VGG16-UAP
3.2%
3.7%
4.0%
12.4%
23.9%
34.9%
24.2%
31.2%
28.1%
44.0%
24.5%
32.8%
32.3%
50.0%
28.5%
46.9%
23.9%
34.7%
23.9%
33.2%
26.7%
46.4%
22.7%
43.7%
Inception-V3-TAP
Inception-V3-FGSM
Inception-V3-IFGSM
Inception-V3-UAP
Inception-V3-MI-FGSM
Inception-V3-CW
29.4%
57.7%
66.0%
39.8%
45.9%
84.9%
0.00%
26.9%
0.01%
52.2%
0.1%
24.5%
22.1%
70.2%
67.7%
56.4%
47.3%
93.5%
24.7%
72.9%
70.2%
63.1%
50.7%
98.6%
46.9%
65.7%
76.8%
50.5%
61.8%
86.9%
30.8%
75.4%
73.6%
64.6%
62.5%
96.9%
Transferability in terms of recognition accuracies
Test dataset can be download at
https://github.com/tensorflow/cleverhans/tree/master/examples/nips17 adversarial competition/dataset
VGG16 InceptionV3 InceptionV4
Inception
ResNet-V2
ResNet-V2 Ensemble
No perturbation 86.8% 96.4% 97.6% 100% 89.6% 99.8%
Inc-ResV2-TAP
Inc-ResV2-FGSM
Inc-ResV2-IFGSM
Inc-ResV2-MI-FGSM
Inc-ResV2-CW
37.0%
59.4%
48.9%
38.8%
83.4%
25.9%
69.0%
41.5%
25.3%
91.7%
33.2%
76.5%
51.5%
33.2%
92.4%
4.8%
57.2%
1.2%
0.1%
49.0%
53.3%
71.7%
60.4%
51.6%
85.6%
48.2%
78.7%
54.5%
46.3%
93.5%
ResNet-V2-TAP
ResNet-V2-FGSM
ResNet-V2-IFGSM
ResNet-V2-MI-FGSM
ResNet-V2-CW
31.8%
37.3%
44.8%
46.3%
84.0%
48.2%
56.3%
53.2%
45.2%
94.5%
55.7%
64.8%
62.0%
51.6%
96.4%
55.5%
66.8%
63.8%
55.2%
99.5%
7.6%
14.6%
4.4%
24.1%
37.7%
47.4%
63.3%
54.3%
56.2%
98.5%
ResNet-V1-TAP
ResNet-V1-UAP
ResNet-V1-MI-FGSM
ResNet-V1-CW
20.2%
35.3%
65.3%
86.9%
38.1%
41.6%
74.3%
96.0%
48.7%
50.2%
78.7%
97.5%
49.1%
57.8%
82.0%
99.9%
25.3%
40.3%
71.3%
89.4 %
44.4%
56.8%
86.8%
99.6%
Transferability in terms of recognition accuracies
Robustness to adversarially trained models
adv-v3 adv-res-v2 ens3-inc-v3 ens4-inc-v3
VGG16-TAP
VGG16-FGSM
VGG16-IFGSM
VGG16-UAP
38.8%
50.9%
57.3%
39.4%
63.8%
71.1%
73.6%
57.3%
41.9%
56.1%
53.5%
47.4%
47.3%
58.5%
55.4%
43.9%
Inc-V3-TAP
Inc-V3-FGSM
Inc-V3-IFGSM
Inc-V3-UAP
Inc-V3-MI-FGSM
Inc-V3-CW
52.8%
72.1%
82.4%
65.5%
74.3%
93.0%
68.8%
93.6%
93.9%
82.4%
90.6%
96.4%
60.9%
85.1%
88.2%
77.0%
80.7%
92.3%
59.8%
86.4%
88.5%
76.9%
82.0%
90.0 %
Robustness to adversarially trained models
adv-v3 adv-res-v2 ens3-inc-v3 ens4-inc-v3
Inc-ResV2-TAP
Inc-ResV2-FGSM
Inc-ResV2-IFGSM
Inc-ResV2-MI-FGSM
Inc-ResV2-CW
60.5%
73.9%
70.8%
66.9%
91.8%
87.8%
92.7%
92.9%
83.6%
94.9%
79.1%
86.9%
84.8%
71.8%
91.9%
82.1%
87.3%
86.9%
73.4%
89.3%
ResNet-V2-TAP
ResNet-V2-FGSM
ResNet-V2-IFGSM
ResNet-V2-MI-FGSM
ResNet-V2-CW
49.2%
62.1%
64.7%
71.1%
94.0%
64.1%
85.7%
82.6%
86.6%
96.3%
57.8%
77.4%
72.3%
76.9%
92.8%
56.0%
77.8%
74.7%
77.9%
90.5%
ResNet-V1-TAP
ResNet-V1-UAP
ResNet-V1-MI-FGSM
ResNet-V1-CW
50.2%
60.4%
84.5%
95.0%
64.4%
77.9%
93.4%
97.5%
55.5%
68.8%
90.3%
94.2%
57.7%
66.1%
90.2 %
91.8%
Defense Against Adversarial Attack
),~(),(||),~(),(|| 2
yxlyxldxLdxLLoss
Dd
 

conv
conv
fn
conv
conv
conv
fnconv


Dd
adv dxLdxL 2
||),(),(||
l(x,y)l(xadv,y)
Loss
Takeaways
ATTACK
Maximizing the distance of feature maps.
Adding a smooth regularization.
DEFENSE
Minimizing the distance of feature maps.
THANK YOU
References
FGSM:
Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples.
International conference on learning representations (2015)
IFGSM:
Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. arXiv:
Computer Vision and Pattern Recognition (2016)
UAP:
Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial
perturbations. arXiv preprint arXiv:1610.08401 (2016)
C&W:
Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. arXiv
preprint arXiv:1608.04644 (2016)
MI-FGSM:
Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., Li, J.: Boosting adversarial attacks
with momentum. In: The IEEE Conference on Computer Vision and Pattern Recognition
(CVPR). (June 2018)

More Related Content

Similar to TRANSFERABLE ADVERSARIAL PERTURBATIONS - Tencent Blade Team - DEF CON 26 CAAD VILLAGE

Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Koji Yamamoto
 
Projection methods for stochastic structural dynamics
Projection methods for stochastic structural dynamicsProjection methods for stochastic structural dynamics
Projection methods for stochastic structural dynamics
University of Glasgow
 

Similar to TRANSFERABLE ADVERSARIAL PERTURBATIONS - Tencent Blade Team - DEF CON 26 CAAD VILLAGE (10)

On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
On the performance of reconfigurable intelligent surface-assisted UAV-to-grou...
 
Speckle noise reduction using hybrid tmav based fuzzy filter
Speckle noise reduction using hybrid tmav based fuzzy filterSpeckle noise reduction using hybrid tmav based fuzzy filter
Speckle noise reduction using hybrid tmav based fuzzy filter
 
Improved F-parameter Mountain Gazelle Optimizer (IFMGO): A Comparative Analys...
Improved F-parameter Mountain Gazelle Optimizer (IFMGO): A Comparative Analys...Improved F-parameter Mountain Gazelle Optimizer (IFMGO): A Comparative Analys...
Improved F-parameter Mountain Gazelle Optimizer (IFMGO): A Comparative Analys...
 
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
Machine Learning and Stochastic Geometry: Statistical Frameworks Against Unce...
 
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlation
 
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGICDESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGIC
 
Contribution à l'étude du trafic routier sur réseaux à l'aide des équations d...
Contribution à l'étude du trafic routier sur réseaux à l'aide des équations d...Contribution à l'étude du trafic routier sur réseaux à l'aide des équations d...
Contribution à l'étude du trafic routier sur réseaux à l'aide des équations d...
 
Projection methods for stochastic structural dynamics
Projection methods for stochastic structural dynamicsProjection methods for stochastic structural dynamics
Projection methods for stochastic structural dynamics
 
DESIGN PARAMETERS OF A DYNAMIC VIBRATION ABSORBER WITH TWO SPRINGS IN PARALLEL
DESIGN PARAMETERS OF A DYNAMIC VIBRATION ABSORBER WITH TWO SPRINGS IN PARALLELDESIGN PARAMETERS OF A DYNAMIC VIBRATION ABSORBER WITH TWO SPRINGS IN PARALLEL
DESIGN PARAMETERS OF A DYNAMIC VIBRATION ABSORBER WITH TWO SPRINGS IN PARALLEL
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 

More from GeekPwn Keen

BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
GeekPwn Keen
 
RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...
RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...
RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...
GeekPwn Keen
 
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
GeekPwn Keen
 

More from GeekPwn Keen (14)

PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
 
THE VANISHING TRICK FOR SELF-DRIVING CARS - Weilin Xu - DEF CON 26 CAAD VILLAGE
THE VANISHING TRICK FOR SELF-DRIVING CARS - Weilin Xu - DEF CON 26 CAAD VILLAGETHE VANISHING TRICK FOR SELF-DRIVING CARS - Weilin Xu - DEF CON 26 CAAD VILLAGE
THE VANISHING TRICK FOR SELF-DRIVING CARS - Weilin Xu - DEF CON 26 CAAD VILLAGE
 
TARGETED ADVERSARIAL EXAMPLES FOR BLACK BOX AUDIO SYSTEMS - Rohan Taori, Amog...
TARGETED ADVERSARIAL EXAMPLES FOR BLACK BOX AUDIO SYSTEMS - Rohan Taori, Amog...TARGETED ADVERSARIAL EXAMPLES FOR BLACK BOX AUDIO SYSTEMS - Rohan Taori, Amog...
TARGETED ADVERSARIAL EXAMPLES FOR BLACK BOX AUDIO SYSTEMS - Rohan Taori, Amog...
 
ADVERSARIAL^2 TRAINING - Yao Zhao, Yuzhe Zhao - DEF CON 26 CAAD VILLAGE
ADVERSARIAL^2 TRAINING - Yao Zhao, Yuzhe Zhao - DEF CON 26 CAAD VILLAGEADVERSARIAL^2 TRAINING - Yao Zhao, Yuzhe Zhao - DEF CON 26 CAAD VILLAGE
ADVERSARIAL^2 TRAINING - Yao Zhao, Yuzhe Zhao - DEF CON 26 CAAD VILLAGE
 
HOW TO LEVERAGE THE OPEN-SOURCE INFORMATION TO MAKE AN EFFECTIVE ADVERSARIAL ...
HOW TO LEVERAGE THE OPEN-SOURCE INFORMATION TO MAKE AN EFFECTIVE ADVERSARIAL ...HOW TO LEVERAGE THE OPEN-SOURCE INFORMATION TO MAKE AN EFFECTIVE ADVERSARIAL ...
HOW TO LEVERAGE THE OPEN-SOURCE INFORMATION TO MAKE AN EFFECTIVE ADVERSARIAL ...
 
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
 
RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...
RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...
RECENT PROGRESS IN ADVERSARIAL DEEP LEARNING ATTACK AND DEFENSE - Wenbo Guo a...
 
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
WEAPONS FOR DOG FIGHT:ADAPTING MALWARE TO ANTI-DETECTION BASED ON GAN - Zhuan...
 
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
 
Bo Li-they’ve created images that reliably fool neural network
Bo Li-they’ve created images that reliably fool neural networkBo Li-they’ve created images that reliably fool neural network
Bo Li-they’ve created images that reliably fool neural network
 
Alexey kurakin-what's new in adversarial machine learning
Alexey kurakin-what's new in adversarial machine learningAlexey kurakin-what's new in adversarial machine learning
Alexey kurakin-what's new in adversarial machine learning
 
Nick Stephens-how does someone unlock your phone with nose
Nick Stephens-how does someone unlock your phone with noseNick Stephens-how does someone unlock your phone with nose
Nick Stephens-how does someone unlock your phone with nose
 

Recently uploaded

Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 

TRANSFERABLE ADVERSARIAL PERTURBATIONS - Tencent Blade Team - DEF CON 26 CAAD VILLAGE

  • 1.
  • 2. Transferable Adversarial Perturbations Bruce HOU 1 Wen ZHOU 1 Yongjun CHEN Mengyun TANG
  • 3. Bruce HOU Wen ZHOU Yongjun CHEN Mengyun TANG
  • 4. Team Honors NIPS 2017 Competition: Non-targeted Adversarial Attack ranking: 6/91 Defense Against Adversarial Attack ranking: 8/108 Publication: Transferable Adversarial Perturbations: European Conference on Computer Vision (ECCV 2018)
  • 5. Transferable Perturbations Transferability: Maximizing the distance in the intermediate feature maps Robustness: Introducing smooth regularization on adversarial perturbations
  • 6.
  • 9. Optimization initialize: while i < k do: end while return ,0,/,~ 0  ikxx  )11)~((~ ,,-xx-signxclipx k  )11))~((~(~ 1 ,,, x, t,wxJsignεxclipx sixii 
  • 10. VGG16 InceptionV3 InceptionV4 Inception ResNet-V2 ResNet-V2 Ensemble No perturbation 86.8% 96.4% 97.6% 100% 89.6% 99.8% Random noise 81.3% 91.7% 94.6% 97.8% 84.5% 98.1% VGG16-TAP VGG16-FGSM VGG16-IFGSM VGG16-UAP 3.2% 3.7% 4.0% 12.4% 23.9% 34.9% 24.2% 31.2% 28.1% 44.0% 24.5% 32.8% 32.3% 50.0% 28.5% 46.9% 23.9% 34.7% 23.9% 33.2% 26.7% 46.4% 22.7% 43.7% Inception-V3-TAP Inception-V3-FGSM Inception-V3-IFGSM Inception-V3-UAP Inception-V3-MI-FGSM Inception-V3-CW 29.4% 57.7% 66.0% 39.8% 45.9% 84.9% 0.00% 26.9% 0.01% 52.2% 0.1% 24.5% 22.1% 70.2% 67.7% 56.4% 47.3% 93.5% 24.7% 72.9% 70.2% 63.1% 50.7% 98.6% 46.9% 65.7% 76.8% 50.5% 61.8% 86.9% 30.8% 75.4% 73.6% 64.6% 62.5% 96.9% Transferability in terms of recognition accuracies Test dataset can be download at https://github.com/tensorflow/cleverhans/tree/master/examples/nips17 adversarial competition/dataset
  • 11. VGG16 InceptionV3 InceptionV4 Inception ResNet-V2 ResNet-V2 Ensemble No perturbation 86.8% 96.4% 97.6% 100% 89.6% 99.8% Inc-ResV2-TAP Inc-ResV2-FGSM Inc-ResV2-IFGSM Inc-ResV2-MI-FGSM Inc-ResV2-CW 37.0% 59.4% 48.9% 38.8% 83.4% 25.9% 69.0% 41.5% 25.3% 91.7% 33.2% 76.5% 51.5% 33.2% 92.4% 4.8% 57.2% 1.2% 0.1% 49.0% 53.3% 71.7% 60.4% 51.6% 85.6% 48.2% 78.7% 54.5% 46.3% 93.5% ResNet-V2-TAP ResNet-V2-FGSM ResNet-V2-IFGSM ResNet-V2-MI-FGSM ResNet-V2-CW 31.8% 37.3% 44.8% 46.3% 84.0% 48.2% 56.3% 53.2% 45.2% 94.5% 55.7% 64.8% 62.0% 51.6% 96.4% 55.5% 66.8% 63.8% 55.2% 99.5% 7.6% 14.6% 4.4% 24.1% 37.7% 47.4% 63.3% 54.3% 56.2% 98.5% ResNet-V1-TAP ResNet-V1-UAP ResNet-V1-MI-FGSM ResNet-V1-CW 20.2% 35.3% 65.3% 86.9% 38.1% 41.6% 74.3% 96.0% 48.7% 50.2% 78.7% 97.5% 49.1% 57.8% 82.0% 99.9% 25.3% 40.3% 71.3% 89.4 % 44.4% 56.8% 86.8% 99.6% Transferability in terms of recognition accuracies
  • 12. Robustness to adversarially trained models adv-v3 adv-res-v2 ens3-inc-v3 ens4-inc-v3 VGG16-TAP VGG16-FGSM VGG16-IFGSM VGG16-UAP 38.8% 50.9% 57.3% 39.4% 63.8% 71.1% 73.6% 57.3% 41.9% 56.1% 53.5% 47.4% 47.3% 58.5% 55.4% 43.9% Inc-V3-TAP Inc-V3-FGSM Inc-V3-IFGSM Inc-V3-UAP Inc-V3-MI-FGSM Inc-V3-CW 52.8% 72.1% 82.4% 65.5% 74.3% 93.0% 68.8% 93.6% 93.9% 82.4% 90.6% 96.4% 60.9% 85.1% 88.2% 77.0% 80.7% 92.3% 59.8% 86.4% 88.5% 76.9% 82.0% 90.0 %
  • 13. Robustness to adversarially trained models adv-v3 adv-res-v2 ens3-inc-v3 ens4-inc-v3 Inc-ResV2-TAP Inc-ResV2-FGSM Inc-ResV2-IFGSM Inc-ResV2-MI-FGSM Inc-ResV2-CW 60.5% 73.9% 70.8% 66.9% 91.8% 87.8% 92.7% 92.9% 83.6% 94.9% 79.1% 86.9% 84.8% 71.8% 91.9% 82.1% 87.3% 86.9% 73.4% 89.3% ResNet-V2-TAP ResNet-V2-FGSM ResNet-V2-IFGSM ResNet-V2-MI-FGSM ResNet-V2-CW 49.2% 62.1% 64.7% 71.1% 94.0% 64.1% 85.7% 82.6% 86.6% 96.3% 57.8% 77.4% 72.3% 76.9% 92.8% 56.0% 77.8% 74.7% 77.9% 90.5% ResNet-V1-TAP ResNet-V1-UAP ResNet-V1-MI-FGSM ResNet-V1-CW 50.2% 60.4% 84.5% 95.0% 64.4% 77.9% 93.4% 97.5% 55.5% 68.8% 90.3% 94.2% 57.7% 66.1% 90.2 % 91.8%
  • 14. Defense Against Adversarial Attack ),~(),(||),~(),(|| 2 yxlyxldxLdxLLoss Dd    conv conv fn conv conv conv fnconv   Dd adv dxLdxL 2 ||),(),(|| l(x,y)l(xadv,y) Loss
  • 15. Takeaways ATTACK Maximizing the distance of feature maps. Adding a smooth regularization. DEFENSE Minimizing the distance of feature maps.
  • 17. References FGSM: Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. International conference on learning representations (2015) IFGSM: Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. arXiv: Computer Vision and Pattern Recognition (2016) UAP: Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. arXiv preprint arXiv:1610.08401 (2016) C&W: Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. arXiv preprint arXiv:1608.04644 (2016) MI-FGSM: Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., Li, J.: Boosting adversarial attacks with momentum. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). (June 2018)