Towards Hiding Adversarial Examples from Network Interpretation

dc.contributor.authorSubramanya, Akshayvarun
dc.contributor.authorPillai, Vipin
dc.contributor.authorPirsiavash, Hamed
dc.date.accessioned2019-07-03T17:36:26Z
dc.date.available2019-07-03T17:36:26Z
dc.date.issued2018-12-06
dc.description.abstractDeep networks have been shown to be fooled rather easily using adversarial attack algorithms. Practical methods such as adversarial patches have been shown to be extremely effective in causing misclassification. However, these patches can be highlighted using standard network interpretation algorithms, thus revealing the identity of the adversary. We show that it is possible to create adversarial patches which not only fool the prediction, but also change what we interpret regarding the cause of prediction. We show that our algorithms can empower adversarial patches, by hiding them from network interpretation tools. We believe our algorithms can facilitate developing more robust network interpretation tools that truly explain the network’s underlying decision making process.en_US
dc.description.sponsorshipThis work was performed under the following financial assistance award: 60NANB18D279 from U.S. Department of Commerce, National Institute of Standards and Technology, and also funding from SAP SE.en_US
dc.description.urihttps://arxiv.org/abs/1812.02843en_US
dc.format.extent10 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/m256in-dfyc
dc.identifier.citationAkshayvarun Subramanya, Vipin Pillai, Hamed Pirsiavash, Towards Hiding Adversarial Examples from Network Interpretation, Computer Vision and Pattern Recognition , 2018, https://arxiv.org/abs/1812.02843en_US
dc.identifier.urihttp://hdl.handle.net/11603/14342
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectadversarial attack algorithmsen_US
dc.subjectdeep networksen_US
dc.subjectnetwork Interpretationen_US
dc.titleTowards Hiding Adversarial Examples from Network Interpretationen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1812.02843.pdf
Size:
7.39 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: