Cargando…
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7357678/ https://www.ncbi.nlm.nih.gov/pubmed/32685910 http://dx.doi.org/10.1186/s13635-020-00106-x |
_version_ | 1783558714650787840 |
---|---|
author | Taran, Olga Rezaeifar, Shideh Holotyak, Taras Voloshynovskiy, Slava |
author_facet | Taran, Olga Rezaeifar, Shideh Holotyak, Taras Voloshynovskiy, Slava |
author_sort | Taran, Olga |
collection | PubMed |
description | In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage in many critical applications. Therefore, the development of robust DNN-based classifiers is a critical point for the future deployment of these methods. Not less important issue is understanding of the mechanisms behind this vulnerability. Additionally, it is not completely clear how to link machine learning with cryptography to create an information advantage of the defender over the attacker. In this paper, we propose a key-based diversified aggregation (KDA) mechanism as a defense strategy in a gray- and black-box scenario. KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set, but (iii) does not know a secret key and does not have access to the internal states of the system. The robustness of the system is achieved by a specially designed key-based randomization. The proposed randomization prevents the gradients’ back propagation and restricts the attacker to create a “bypass” system. The randomization is performed simultaneously in several channels. Each channel introduces its own randomization in a special transform domain. The sharing of a secret key between the training and test stages creates an information advantage to the defender. Finally, the aggregation of soft outputs from each channel stabilizes the results and increases the reliability of the final score. The performed experimental evaluation demonstrates a high robustness and universality of the KDA against state-of-the-art gradient-based gray-box transferability attacks and the non-gradient-based black-box attacks (The results reported in this paper have been partially presented in CVPR 2019 (Taran et al., Defending against adversarial attacks by randomized diversification, 2019) & ICIP 2019 (Taran et al., Robustification of deep net classifiers by key-based diversified aggregation with pre-filtering, 2019)). |
format | Online Article Text |
id | pubmed-7357678 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-73576782020-07-16 Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation Taran, Olga Rezaeifar, Shideh Holotyak, Taras Voloshynovskiy, Slava EURASIP J Inf Secur Research In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage in many critical applications. Therefore, the development of robust DNN-based classifiers is a critical point for the future deployment of these methods. Not less important issue is understanding of the mechanisms behind this vulnerability. Additionally, it is not completely clear how to link machine learning with cryptography to create an information advantage of the defender over the attacker. In this paper, we propose a key-based diversified aggregation (KDA) mechanism as a defense strategy in a gray- and black-box scenario. KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set, but (iii) does not know a secret key and does not have access to the internal states of the system. The robustness of the system is achieved by a specially designed key-based randomization. The proposed randomization prevents the gradients’ back propagation and restricts the attacker to create a “bypass” system. The randomization is performed simultaneously in several channels. Each channel introduces its own randomization in a special transform domain. The sharing of a secret key between the training and test stages creates an information advantage to the defender. Finally, the aggregation of soft outputs from each channel stabilizes the results and increases the reliability of the final score. The performed experimental evaluation demonstrates a high robustness and universality of the KDA against state-of-the-art gradient-based gray-box transferability attacks and the non-gradient-based black-box attacks (The results reported in this paper have been partially presented in CVPR 2019 (Taran et al., Defending against adversarial attacks by randomized diversification, 2019) & ICIP 2019 (Taran et al., Robustification of deep net classifiers by key-based diversified aggregation with pre-filtering, 2019)). Springer International Publishing 2020-06-01 2020 /pmc/articles/PMC7357678/ /pubmed/32685910 http://dx.doi.org/10.1186/s13635-020-00106-x Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Research Taran, Olga Rezaeifar, Shideh Holotyak, Taras Voloshynovskiy, Slava Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
title | Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
title_full | Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
title_fullStr | Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
title_full_unstemmed | Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
title_short | Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
title_sort | machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7357678/ https://www.ncbi.nlm.nih.gov/pubmed/32685910 http://dx.doi.org/10.1186/s13635-020-00106-x |
work_keys_str_mv | AT taranolga machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation AT rezaeifarshideh machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation AT holotyaktaras machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation AT voloshynovskiyslava machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation |