Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples

We present DeClaW, a system for detecting, classifying, and warning of adversarial inputs presented to a classification neural network. In contrast to current state-of-the-art methods that, given an input, detect whether an input is clean or adversarial, we aim to also identify the types of adversar...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Manohar-Alers, Nelson, Feng, Ryan, Singh, Sahib, Song, Jiguo, Prakash, Atul
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Manohar-Alers, Nelson
Feng, Ryan
Singh, Sahib
Song, Jiguo
Prakash, Atul
description We present DeClaW, a system for detecting, classifying, and warning of adversarial inputs presented to a classification neural network. In contrast to current state-of-the-art methods that, given an input, detect whether an input is clean or adversarial, we aim to also identify the types of adversarial attack (e.g., PGD, Carlini-Wagner or clean). To achieve this, we extract statistical profiles, which we term as anomaly feature vectors, from a set of latent features. Preliminary findings suggest that AFVs can help distinguish among several types of adversarial attacks (e.g., PGD versus Carlini-Wagner) with close to 93% accuracy on the CIFAR-10 dataset. The results open the door to using AFV-based methods for exploring not only adversarial attack detection but also classification of the attack type and then design of attack-specific mitigation strategies.
doi_str_mv 10.48550/arxiv.2107.00561
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2107_00561</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2107_00561</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-2ffbf36ae40c70f463f65c1a7b86216c1aafac8f2e29fca12ded0f5fbe2bc6aa3</originalsourceid><addsrcrecordid>eNotj8FugzAQRH3poUr7AT3VHxCobcDQI6JJWylSLmlzRIvZrSwZiGwShb8vpD3NjDQz0mPsSYo4LbJMvIC_2kuspMhjITIt71n7FWz_w8t-6MBNfIswnj3ybzTj4AOnwfM3HOc0t9a8chCCpWmZQN_yI_h-8QPx_Xl0Fj0v2wv6AN6C45srdCeH4YHdEbiAj_-6Yoft5lB9RLv9-2dV7iLQuYwUUUOJBkyFyQWlOiGdGQl5U2gl9eyAwBSkUL2SAalabAVl1KBqjAZIVuz57_aGWZ-87cBP9YJb33CTX6mnUp0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples</title><source>arXiv.org</source><creator>Manohar-Alers, Nelson ; Feng, Ryan ; Singh, Sahib ; Song, Jiguo ; Prakash, Atul</creator><creatorcontrib>Manohar-Alers, Nelson ; Feng, Ryan ; Singh, Sahib ; Song, Jiguo ; Prakash, Atul</creatorcontrib><description>We present DeClaW, a system for detecting, classifying, and warning of adversarial inputs presented to a classification neural network. In contrast to current state-of-the-art methods that, given an input, detect whether an input is clean or adversarial, we aim to also identify the types of adversarial attack (e.g., PGD, Carlini-Wagner or clean). To achieve this, we extract statistical profiles, which we term as anomaly feature vectors, from a set of latent features. Preliminary findings suggest that AFVs can help distinguish among several types of adversarial attacks (e.g., PGD versus Carlini-Wagner) with close to 93% accuracy on the CIFAR-10 dataset. The results open the door to using AFV-based methods for exploring not only adversarial attack detection but also classification of the attack type and then design of attack-specific mitigation strategies.</description><identifier>DOI: 10.48550/arxiv.2107.00561</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2021-07</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2107.00561$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2107.00561$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Manohar-Alers, Nelson</creatorcontrib><creatorcontrib>Feng, Ryan</creatorcontrib><creatorcontrib>Singh, Sahib</creatorcontrib><creatorcontrib>Song, Jiguo</creatorcontrib><creatorcontrib>Prakash, Atul</creatorcontrib><title>Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples</title><description>We present DeClaW, a system for detecting, classifying, and warning of adversarial inputs presented to a classification neural network. In contrast to current state-of-the-art methods that, given an input, detect whether an input is clean or adversarial, we aim to also identify the types of adversarial attack (e.g., PGD, Carlini-Wagner or clean). To achieve this, we extract statistical profiles, which we term as anomaly feature vectors, from a set of latent features. Preliminary findings suggest that AFVs can help distinguish among several types of adversarial attacks (e.g., PGD versus Carlini-Wagner) with close to 93% accuracy on the CIFAR-10 dataset. The results open the door to using AFV-based methods for exploring not only adversarial attack detection but also classification of the attack type and then design of attack-specific mitigation strategies.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8FugzAQRH3poUr7AT3VHxCobcDQI6JJWylSLmlzRIvZrSwZiGwShb8vpD3NjDQz0mPsSYo4LbJMvIC_2kuspMhjITIt71n7FWz_w8t-6MBNfIswnj3ybzTj4AOnwfM3HOc0t9a8chCCpWmZQN_yI_h-8QPx_Xl0Fj0v2wv6AN6C45srdCeH4YHdEbiAj_-6Yoft5lB9RLv9-2dV7iLQuYwUUUOJBkyFyQWlOiGdGQl5U2gl9eyAwBSkUL2SAalabAVl1KBqjAZIVuz57_aGWZ-87cBP9YJb33CTX6mnUp0</recordid><startdate>20210701</startdate><enddate>20210701</enddate><creator>Manohar-Alers, Nelson</creator><creator>Feng, Ryan</creator><creator>Singh, Sahib</creator><creator>Song, Jiguo</creator><creator>Prakash, Atul</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20210701</creationdate><title>Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples</title><author>Manohar-Alers, Nelson ; Feng, Ryan ; Singh, Sahib ; Song, Jiguo ; Prakash, Atul</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-2ffbf36ae40c70f463f65c1a7b86216c1aafac8f2e29fca12ded0f5fbe2bc6aa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Manohar-Alers, Nelson</creatorcontrib><creatorcontrib>Feng, Ryan</creatorcontrib><creatorcontrib>Singh, Sahib</creatorcontrib><creatorcontrib>Song, Jiguo</creatorcontrib><creatorcontrib>Prakash, Atul</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Manohar-Alers, Nelson</au><au>Feng, Ryan</au><au>Singh, Sahib</au><au>Song, Jiguo</au><au>Prakash, Atul</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples</atitle><date>2021-07-01</date><risdate>2021</risdate><abstract>We present DeClaW, a system for detecting, classifying, and warning of adversarial inputs presented to a classification neural network. In contrast to current state-of-the-art methods that, given an input, detect whether an input is clean or adversarial, we aim to also identify the types of adversarial attack (e.g., PGD, Carlini-Wagner or clean). To achieve this, we extract statistical profiles, which we term as anomaly feature vectors, from a set of latent features. Preliminary findings suggest that AFVs can help distinguish among several types of adversarial attacks (e.g., PGD versus Carlini-Wagner) with close to 93% accuracy on the CIFAR-10 dataset. The results open the door to using AFV-based methods for exploring not only adversarial attack detection but also classification of the attack type and then design of attack-specific mitigation strategies.</abstract><doi>10.48550/arxiv.2107.00561</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2107.00561
ispartof
issn
language eng
recordid cdi_arxiv_primary_2107_00561
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Learning
title Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T10%3A12%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Using%20Anomaly%20Feature%20Vectors%20for%20Detecting,%20Classifying%20and%20Warning%20of%20Outlier%20Adversarial%20Examples&rft.au=Manohar-Alers,%20Nelson&rft.date=2021-07-01&rft_id=info:doi/10.48550/arxiv.2107.00561&rft_dat=%3Carxiv_GOX%3E2107_00561%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true