当前位置:网站首页>The latest good article | interpretable confrontation defense based on causal inference
The latest good article | interpretable confrontation defense based on causal inference
2022-06-10 17:54:00 【Zhiyuan community】
Machine Intelligence Research
Models based on deep learning are vulnerable to adversarial attacks . In sensitive and security critical scenarios , Defense is essential against attacks . However , Deep learning methods still lack effective defense mechanisms against attacks . Most of the existing methods are only expedients for specific antagonistic samples . The research team of the Institute of automation of the Chinese Academy of Sciences used causal reasoning to explore the working mechanism of antagonistic samples , A causal model is established to describe the generation and performance of antagonistic samples . The results are published in MIR In the third issue .

The picture is from Springer
Deep learning method has opened a new era of artificial intelligence . In the field of computer vision , Deep learning method in image classification 、 object detection 、 And image segmentation . Deep neural network shows the powerful ability of nonlinear mapping from raw data to advanced features . However , Antagonistic samples cast a shadow over the great success of deep learning .“ Powerful ” The deep learning module is vulnerable to various adversarial attack algorithms . Attackers can use well-designed perturbations to destroy the predictions of state-of-the-art models , But human beings can not find this disturbance . This problem hinders the application of depth method in sensitive and security critical scenarios . therefore , The defense against adversarial attacks has attracted much attention , And has become an important research topic .
There has been a lot of research on defense against adversarial attacks . However , It is not clear how adversarial samples can destroy the deep learning model . The potential working mechanism of antagonistic samples deserves further exploration and research . therefore , Most of the existing methods are only expedients for specific antagonistic samples . for example , Confrontation training , Introducing antagonistic samples into the training process , As a defense , Get a lot of attention . However , However, the generalization ability of the method based on confrontation training is very limited , Especially for invisible attacks , This limitation is more obvious .
To defend against adversarial attacks , It is necessary to reveal the working mechanism of antagonistic samples . The research team of the Institute of automation of the Chinese Academy of Sciences used causal reasoning to explore the working mechanism of antagonistic samples . Compared with the method based on Statistics , Causal reasoning can more naturally simulate the relationship between variables .
This paper establishes a causal model to describe the generation and performance of antagonistic samples . The causal model enables us to estimate the causal effect between the output of the deep neural network and the antagonistic sample sub region , And this is data driven / What cannot be achieved by statistical methods . therefore , The tampered predictions can be attributed to sub regions , This means that there is a possibility to explain the antagonistic sample and reveal its working mechanism .

Counter samples . Adding a small disturbance to the original image can manipulate the model output
The main contribution of the article is as follows :
1) This paper establishes a causal model to explain the generation and performance of antagonistic samples . The causal model enables us to estimate the causal relationship between the output and input sample sub regions of the deep neural network .
2) Based on causal reasoning , The article reveals the working mechanism of antagonistic samples . The causal effects in different sub areas of antagonistic samples may be inconsistent , Even the opposite . Usually , Only a small number of counter samples play a decisive role in the deception identification model .
3) Based on these findings , This paper puts forward a simple and effective strategy to defend against adversarial attacks . These strategies enable us to detect and identify countermeasure samples , Without additional models or training .
Towards Interpretable Defense Against Adversarial Attacks via Causal Inference
Min Ren, Yun-Long Wang, Zhao-Feng He
https://www.mi-research.net/en/article/doi/10.1007/s11633-022-1330-7
https://link.springer.com/article/10.1007/s11633-022-1330-7
【 The author of this article 】

About Machine Intelligence Research
Machine Intelligence Research( abbreviation MIR, Original title International Journal of Automation and Computing) Sponsored by the Institute of automation, Chinese Academy of Sciences , On 2022 It was officially published in .MIR Based on the domestic 、 Global oriented , Focus on serving the national strategic needs , Publish the latest original research papers in the field of machine intelligence 、 review 、 Comments, etc , Comprehensively report the basic theories and cutting-edge innovative research achievements in the field of international machine intelligence , Promote international academic exchanges and discipline development , Serve the progress of national artificial intelligence science and technology . The journal was selected " China Science and technology journal excellence action plan ", Has been ESCI、EI、Scopus、 The core journals of science and technology in China 、CSCD Wait for the database to include .

Click on " Read the original " Download the third good article for free
边栏推荐
猜你喜欢

牛客网:两数之和

Leetcode 875. Coco, who likes bananas

PCA principal component analysis tutorial (origin analysis & drawing, without R language)

mmdetection之dataloader构建

mmdetection之dataset类解读

5年后,你将如何融入20万亿美元的「项目经济」

com. netflix. client. ClientException: Load balancer does not have available server for client: userser

High number_ Chapter 6 infinite series__ Absolute convergence_ Conditional convergence

Abbexa丙烯酰胺-PEG-NHS说明书

mmcv之Config类介绍
随机推荐
力扣 20. 有效的括号
元宇宙的定义和 7 大无限特征
【FAQ】运动健康服务REST API接口使用过程中常见问题和解决方法总结
一个WPF开发的打印对话框-PrintDialogX
嘿!ONES 新星请看过来|师兄师姐说
THE LOTTERY TICKET HYPOTHESIS: FINDING SPARSE, TRAINABLE NEURAL NETWORKS论文笔记
LoRa模块无线收发通信技术详解
LeetCode 321. Maximum number of splices***
厉害了,工信部推出 “一键解绑” 手机号绑定的互联网账号,堪称神器
mapbox-gl开发教程(十一):加载线图层
苹果放大招!这件事干的太漂亮了……
5年后,你将如何融入20万亿美元的「项目经济」
Daily question -1287 Elements that appear more than 25% in an ordered array
正斜杠“/”、反斜杠“\、”转义字符“\”、文件路径分割符傻傻记不清楚
protoc-gen-go-grpc‘不是内部或外部命令,也不是可运行的程序 或批处理文件
Lifeifei: I am more like a scientist in physics than an engineer
PMP考生,深圳2022年6月PMP考试地点有这些
IIS安装 部署网站
企鹅电竞停步,虎牙也难行
Photoshop如何打开、编辑和导出Webp格式图片的方法