File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Towards understanding limitations of pixel discretization against adversarial attacks

TitleTowards understanding limitations of pixel discretization against adversarial attacks
Authors
Keywordsadversarial attacks
machine learning
pixel discretization
preprocessing defense
Issue Date2019
Citation
Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019, 2019, p. 480-495 How to Cite?
AbstractWide adoption of artificial neural networks in various domains has led to an increasing interest in defending adversarial attacks against them. Preprocessing defense methods such as pixel discretization are particularly attractive in practice due to their simplicity, low computational overhead, and applicability to various systems. It is observed that such methods work well on simple datasets like MNIST, but break on more complicated ones like ImageNet under recently proposed strong white-box attacks. To understand the conditions for success and potentials for improvement, we study the pixel discretization defense method, including more sophisticated variants that take into account the properties of the dataset being discretized. Our results again show poor resistance against the strong attacks. We analyze our results in a theoretical framework and offer strong evidence that pixel discretization is unlikely to work on all but the simplest of the datasets. Furthermore, our arguments present insights why some other preprocessing defenses may be insecure.
Persistent Identifierhttp://hdl.handle.net/10722/341252
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorChen, Jiefeng-
dc.contributor.authorWu, Xi-
dc.contributor.authorRastogi, Vaibhav-
dc.contributor.authorLiang, Yingyu-
dc.contributor.authorJha, Somesh-
dc.date.accessioned2024-03-13T08:41:21Z-
dc.date.available2024-03-13T08:41:21Z-
dc.date.issued2019-
dc.identifier.citationProceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019, 2019, p. 480-495-
dc.identifier.urihttp://hdl.handle.net/10722/341252-
dc.description.abstractWide adoption of artificial neural networks in various domains has led to an increasing interest in defending adversarial attacks against them. Preprocessing defense methods such as pixel discretization are particularly attractive in practice due to their simplicity, low computational overhead, and applicability to various systems. It is observed that such methods work well on simple datasets like MNIST, but break on more complicated ones like ImageNet under recently proposed strong white-box attacks. To understand the conditions for success and potentials for improvement, we study the pixel discretization defense method, including more sophisticated variants that take into account the properties of the dataset being discretized. Our results again show poor resistance against the strong attacks. We analyze our results in a theoretical framework and offer strong evidence that pixel discretization is unlikely to work on all but the simplest of the datasets. Furthermore, our arguments present insights why some other preprocessing defenses may be insecure.-
dc.languageeng-
dc.relation.ispartofProceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019-
dc.subjectadversarial attacks-
dc.subjectmachine learning-
dc.subjectpixel discretization-
dc.subjectpreprocessing defense-
dc.titleTowards understanding limitations of pixel discretization against adversarial attacks-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/EuroSP.2019.00042-
dc.identifier.scopuseid_2-s2.0-85072049586-
dc.identifier.spage480-
dc.identifier.epage495-
dc.identifier.isiWOS:000568610300032-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats