Vis enkel innførsel

dc.contributor.authorTuna, Omer Faruk
dc.contributor.authorCatak, Ferhat Özgur
dc.contributor.authorEskil, Taner
dc.date.accessioned2023-03-23T08:15:28Z
dc.date.available2023-03-23T08:15:28Z
dc.date.created2022-04-02T14:51:43Z
dc.date.issued2022
dc.identifier.citationTuna, O. F., Catak, F. O., & Eskil, M. T. (2022). Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty. Complex & Intelligent Systems, 1-19.en_US
dc.identifier.issn2199-4536
dc.identifier.urihttps://hdl.handle.net/11250/3060011
dc.description.abstractAlthough state-of-the-art deep neural network models are known to be robust to random perturbations, it was verified that these architectures are indeed quite vulnerable to deliberately crafted perturbations, albeit being quasi-imperceptible. These vulnerabilities make it challenging to deploy deep neural network models in the areas where security is a critical concern. In recent years, many research studies have been conducted to develop new attack methods and come up with new defense techniques that enable more robust and reliable models. In this study, we use the quantified epistemic uncertainty obtained from the model’s final probability outputs, along with the model’s own loss function, to generate more effective adversarial samples. And we propose a novel defense approach against attacks like Deepfool which result in adversarial samples located near the model’s decision boundary. We have verified the effectiveness of our attack method on MNIST (Digit), MNIST (Fashion) and CIFAR-10 datasets. In our experiments, we showed that our proposed uncertainty-based reversal method achieved a worst case success rate of around 95% without compromising clean accuracy.en_US
dc.language.isoengen_US
dc.publisherSpringer Linken_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleUncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertaintyen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holderThe authoren_US
dc.subject.nsiVDP::Sikkerhet og sårbarhet: 424en_US
dc.subject.nsiVDP::Security and vulnerability: 424en_US
dc.source.journalComplex & Intelligent Systemsen_US
dc.identifier.doi10.1007/s40747-022-00701-0
dc.identifier.cristin2014818
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal