The Limitations of Deep Learning in Adversarial Settings

作者: Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z. Berkay Celik

DOI: 10.1109/EUROSP.2016.36

关键词:

摘要: … In this work, we formalize the space of adversaries against deep … a mapping from input perturbations to DNN output variations. … Its low dimensionality allows us to better understand the …

参考文章(37)
Nedim Šrndić, Battista Biggio, Giorgio Giacinto, Igino Corona, Fabio Roli, Davide Maiorca, Blaine Nelson, Pavel Laskov, Evasion attacks against machine learning at test time european conference on machine learning. ,vol. 8190, pp. 387- 402 ,(2013) , 10.1007/978-3-642-40994-3_25
David E. Rumelhart, Geoffrey E. Hinton, Ronald J. Williams, Learning representations by back-propagating errors Nature. ,vol. 323, pp. 696- 699 ,(1988) , 10.1038/323533A0
Tara N. Sainath, Oriol Vinyals, Andrew Senior, Hasim Sak, Convolutional, Long Short-Term Memory, fully connected Deep Neural Networks international conference on acoustics, speech, and signal processing. pp. 4580- 4584 ,(2015) , 10.1109/ICASSP.2015.7178838
Mike Speciner, Radia Perlman, Charlie Kaufman, Network Security: Private Communication in a Public World ,(1995)
Anh Nguyen, Jason Yosinski, Jeff Clune, Deep neural networks are easily fooled: High confidence predictions for unrecognizable images computer vision and pattern recognition. pp. 427- 436 ,(2015) , 10.1109/CVPR.2015.7298640
George E. Dahl, Jack W. Stokes, Li Deng, Dong Yu, Large-scale malware classification using random projections and neural networks international conference on acoustics, speech, and signal processing. pp. 3422- 3426 ,(2013) , 10.1109/ICASSP.2013.6638293
J.D. Tygar, Adversarial Machine Learning IEEE Internet Computing. ,vol. 15, pp. 4- 6 ,(2011) , 10.1109/MIC.2011.112
BATTISTA BIGGIO, GIORGIO FUMERA, FABIO ROLI, Pattern Recognition Systems under Attack: Design Issues and Research Challenges International Journal of Pattern Recognition and Artificial Intelligence. ,vol. 28, pp. 1460002- ,(2014) , 10.1142/S0218001414600027
Prahlad Fogla, Wenke Lee, Evading network anomaly detection systems Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 59- 68 ,(2006) , 10.1145/1180405.1180414