Cargando…

Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation

In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage...

Descripción completa

Detalles Bibliográficos
Autores principales: Taran, Olga, Rezaeifar, Shideh, Holotyak, Taras, Voloshynovskiy, Slava
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7357678/
https://www.ncbi.nlm.nih.gov/pubmed/32685910
http://dx.doi.org/10.1186/s13635-020-00106-x
_version_ 1783558714650787840
author Taran, Olga
Rezaeifar, Shideh
Holotyak, Taras
Voloshynovskiy, Slava
author_facet Taran, Olga
Rezaeifar, Shideh
Holotyak, Taras
Voloshynovskiy, Slava
author_sort Taran, Olga
collection PubMed
description In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage in many critical applications. Therefore, the development of robust DNN-based classifiers is a critical point for the future deployment of these methods. Not less important issue is understanding of the mechanisms behind this vulnerability. Additionally, it is not completely clear how to link machine learning with cryptography to create an information advantage of the defender over the attacker. In this paper, we propose a key-based diversified aggregation (KDA) mechanism as a defense strategy in a gray- and black-box scenario. KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set, but (iii) does not know a secret key and does not have access to the internal states of the system. The robustness of the system is achieved by a specially designed key-based randomization. The proposed randomization prevents the gradients’ back propagation and restricts the attacker to create a “bypass” system. The randomization is performed simultaneously in several channels. Each channel introduces its own randomization in a special transform domain. The sharing of a secret key between the training and test stages creates an information advantage to the defender. Finally, the aggregation of soft outputs from each channel stabilizes the results and increases the reliability of the final score. The performed experimental evaluation demonstrates a high robustness and universality of the KDA against state-of-the-art gradient-based gray-box transferability attacks and the non-gradient-based black-box attacks (The results reported in this paper have been partially presented in CVPR 2019 (Taran et al., Defending against adversarial attacks by randomized diversification, 2019) & ICIP 2019 (Taran et al., Robustification of deep net classifiers by key-based diversified aggregation with pre-filtering, 2019)).
format Online
Article
Text
id pubmed-7357678
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-73576782020-07-16 Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation Taran, Olga Rezaeifar, Shideh Holotyak, Taras Voloshynovskiy, Slava EURASIP J Inf Secur Research In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classification systems to adversarial attacks questions their usage in many critical applications. Therefore, the development of robust DNN-based classifiers is a critical point for the future deployment of these methods. Not less important issue is understanding of the mechanisms behind this vulnerability. Additionally, it is not completely clear how to link machine learning with cryptography to create an information advantage of the defender over the attacker. In this paper, we propose a key-based diversified aggregation (KDA) mechanism as a defense strategy in a gray- and black-box scenario. KDA assumes that the attacker (i) knows the architecture of classifier and the used defense strategy, (ii) has an access to the training data set, but (iii) does not know a secret key and does not have access to the internal states of the system. The robustness of the system is achieved by a specially designed key-based randomization. The proposed randomization prevents the gradients’ back propagation and restricts the attacker to create a “bypass” system. The randomization is performed simultaneously in several channels. Each channel introduces its own randomization in a special transform domain. The sharing of a secret key between the training and test stages creates an information advantage to the defender. Finally, the aggregation of soft outputs from each channel stabilizes the results and increases the reliability of the final score. The performed experimental evaluation demonstrates a high robustness and universality of the KDA against state-of-the-art gradient-based gray-box transferability attacks and the non-gradient-based black-box attacks (The results reported in this paper have been partially presented in CVPR 2019 (Taran et al., Defending against adversarial attacks by randomized diversification, 2019) & ICIP 2019 (Taran et al., Robustification of deep net classifiers by key-based diversified aggregation with pre-filtering, 2019)). Springer International Publishing 2020-06-01 2020 /pmc/articles/PMC7357678/ /pubmed/32685910 http://dx.doi.org/10.1186/s13635-020-00106-x Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Research
Taran, Olga
Rezaeifar, Shideh
Holotyak, Taras
Voloshynovskiy, Slava
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
title Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
title_full Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
title_fullStr Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
title_full_unstemmed Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
title_short Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
title_sort machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7357678/
https://www.ncbi.nlm.nih.gov/pubmed/32685910
http://dx.doi.org/10.1186/s13635-020-00106-x
work_keys_str_mv AT taranolga machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation
AT rezaeifarshideh machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation
AT holotyaktaras machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation
AT voloshynovskiyslava machinelearningthroughcryptographicglassescombatingadversarialattacksbykeybaseddiversifiedaggregation