fabrizio falchi cnr it fabrizio falchi cnr it fabrizio
play

fabrizio.falchi@cnr.it fabrizio.falchi@cnr.it - PowerPoint PPT Presentation

A TTACKING D EEP N EURAL N ETWORKS WITH A DVERSARIAL I MAGES Fabrizio Falchi ISTI, CNR, Pisa, italy www.fabriziofalchi.it COST ACTION CA16101 - Dubrovnik, November 7th fabrizio.falchi@cnr.it fabrizio.falchi@cnr.it fabrizio.falchi@cnr.it W HAT


  1. A TTACKING D EEP N EURAL N ETWORKS WITH A DVERSARIAL I MAGES Fabrizio Falchi ISTI, CNR, Pisa, italy www.fabriziofalchi.it COST ACTION CA16101 - Dubrovnik, November 7th

  2. fabrizio.falchi@cnr.it

  3. fabrizio.falchi@cnr.it

  4. fabrizio.falchi@cnr.it

  5. W HAT ’ S THAT ? fabrizio.falchi@cnr.it

  6. W HAT ’ S THAT ? fabrizio.falchi@cnr.it

  7. W HAT ’ S THAT ? fabrizio.falchi@cnr.it

  8. W HAT ’ S THAT ? fabrizio.falchi@cnr.it

  9. A DVERSARIAL E XAMPLES fabrizio.falchi@cnr.it

  10. I LLUSIONS Edward H. Adelson fabrizio.falchi@cnr.it

  11. I LLUSIONS Edward H. Adelson fabrizio.falchi@cnr.it

  12. fabrizio.falchi@cnr.it

  13. DUBROVNIK fabrizio.falchi@cnr.it

  14. D UBROVNIK – D EEP D REAM fabrizio.falchi@cnr.it

  15. K NOW Y OUR E NEMY

  16. A DVERSARY Goal Knowledge Capability fabrizio.falchi@cnr.it

  17. A DVERSARY ’ S G OAL

  18. G ENUINE I MAGES … Mushrooms Pineapple Toucan … fabrizio.falchi@cnr.it

  19. 19 N ON -T ARGETED A TTACK Goal + NON-TARGETED = … Mushrooms <whatever> … fabrizio.falchi@cnr.it

  20. 20 T ARGETED A TTACK Goal + TARGETED = … Mushrooms Toucan … fabrizio.falchi@cnr.it

  21. Goal Knowledge Capability fabrizio.falchi@cnr.it

  22. Slide credit: Biggio fabrizio.falchi@cnr.it

  23. A TTACKING D EEP N EURAL N ETWORKS fabrizio.falchi@cnr.it

  24. B LACK B OX A DVERSARIAL E XAMPLE A TTACKS Practical Black-Box Attacks against Machine Learning Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami fabrizio.falchi@cnr.it

  25. A TTACKING F ACE R ECOGNITION S YSTEMS

  26. A DVERIAL F ACES Fast Geometrically-Perturbed Adversarial Faces Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi fabrizio.falchi@cnr.it

  27. A DVERSARIAL F ACES Fast Geometrically-Perturbed Adversarial Faces Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi fabrizio.falchi@cnr.it

  28. Fast Geometrically-Perturbed Adversarial Faces Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi fabrizio.falchi@cnr.it

  29. A DVERSARIAL F ACES Fast Geometrically-Perturbed Adversarial Faces Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi fabrizio.falchi@cnr.it

  30. Fast Geometrically-Perturbed Adversarial Faces Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi fabrizio.falchi@cnr.it

  31. Fast Geometrically-Perturbed Adversarial Faces Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi fabrizio.falchi@cnr.it

  32. A TTACKING IN R EAL W ORLD

  33. 33 A DVERSARIAL I MAGE Photo: labsix fabrizio.falchi@cnr.it

  34. 34 R OTATE A DVERSARIAL I MAGE Photo: labsix fabrizio.falchi@cnr.it

  35. fabrizio.falchi@cnr.it

  36. 36 fabrizio.falchi@cnr.it

  37. Robust Physical-World Attacks on Deep Learning Models Eykholt, Evtimov, Fernandes, Bo Li, Rahmati, Xiao, Prakash, Kohno, Song fabrizio.falchi@cnr.it

  38. fabrizio.falchi@cnr.it

  39. Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter fabrizio.falchi@cnr.it

  40. A TTACKING DNN IN R EAL W ORLD Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter fabrizio.falchi@cnr.it

  41. A TTACKING DNN IN R EAL W ORLD Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter fabrizio.falchi@cnr.it

  42. A TTACKING DNN IN R EAL W ORLD Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter fabrizio.falchi@cnr.it

  43. A TTACKING F ACE V ERIFICATION S YSTEMS

  44. F ACE R COGNITION ID1 ID2 ID3 ... ID10 ... IDn fabrizio.falchi@cnr.it

  45. F ACE V ERIFICATION fabrizio.falchi@cnr.it

  46. 46 F ACE V ERIFIATION Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks Goswami, Ratha, Agarwal, Singh, Vatsa fabrizio.falchi@cnr.it

  47. 47 F ACE V ERIFIATION Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks Goswami, Ratha, Agarwal, Singh, Vatsa fabrizio.falchi@cnr.it

  48. A DVERSARY -A WARE M ACHINE L EARNING

  49. 49 A DVERSARY -A WARE M ACHINE L EARNING Machine learning system should be aware of the arms race with the adversary Security evaluation of pattern classifiers under attack Biggio, Fumera, Roli fabrizio.falchi@cnr.it

  50. fabrizio.falchi@cnr.it

  51. A DVERSARIAL E XAMPLE D ETECTION

  52. 52 G ENIUNE I MAGES … Mushrooms Pineapple Toucan … fabrizio.falchi@cnr.it

  53. 53 N ON -T ARGETED A TTACK + = … Mushrooms <whatever> … fabrizio.falchi@cnr.it

  54. 54 D EFENSE + Increase robustness = … Mushrooms … fabrizio.falchi@cnr.it

  55. 55 D ETECTION + Attack detection = … Mushrooms … fabrizio.falchi@cnr.it

  56. A DVERSARIAL E XAMPLES D ETECTION Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter fabrizio.falchi@cnr.it

  57. O UR A PPROACH

  58. D EEP LEARNING ( FROM N ATURE ) AI Machine Learning Repres. Learning Deep Learning fabrizio.falchi@cnr.it

  59. D EEP LEARNING ( FROM N ATURE ) Representation learning methods that allow a machine to be fed with raw data and to automatically discover the representations needed for detection or classification. Deep-learning are representation learning methods o with multiple levels of representation, obtained by o composing simple but non-linear modules that each o transform the representation at one level into a representation at a higher, slightly more abstract level. fabrizio.falchi@cnr.it

  60. M ULTIPLE L EVELS O F A BSTRACTION fabrizio.falchi@cnr.it

  61. M ULTIPLE L EVELS O F A BSTRACTION fabrizio.falchi@cnr.it

  62. O UR A PPROACH A detection scheme for adversarial images based on internal representation (aka deep features ) of the neural network classifier. • Main intuition : look at the evolution of features, i.e. the path formed by their positions in the feature spaces, during the forward pass of the network. • Claim : The trajectories traced by authentic inputs and adversarial examples differ and can be used to discern them. Adversarial examples detection in features distance spaces F. Carrara, R. Becarelli, R. Caldelli, F. Falchi, G. Amato ECCV WOCM Workshop 2018 fabrizio.falchi@cnr.it

  63. M ULTIPLE L EVELS O F A BSTRACTION fabrizio.falchi@cnr.it

  64. O UR A PPROACH : R ESULTS fabrizio.falchi@cnr.it

  65. 66 E ASY TO I DENTIFY A DVERSARIAL IMAGES fabrizio.falchi@cnr.it

  66. H ARD TO I DENTIFY A DVERSARIAL I MAGES fabrizio.falchi@cnr.it

  67. O THER D ETECTION A PPROACHES • Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods [2017] Nicholas Carlini, David Wagner • On Detecting Adversarial Perturbations [2017] Jan Hendrik Metzen, Tim Genewein, Volker Fischer, Bastian Bischoff • Trace and detect adversarial attacks on CNNs using feature response maps [2018] Mohammadreza, Friedhelm, Thilo • Adversarial examples detection in features distance spaces [2018] F. Carrara, R. Becarelli, R. Caldelli, F. Falchi, G. Amato fabrizio.falchi@cnr.it

  68. R ELATED T OPICS

  69. D ETECTING F ACE M ORPHING A TTACKS Detection of Face Morphing Attacks by Deep Learning C. Seibold, W. Samek, A. Hilsmann, P. Eisert fabrizio.falchi@cnr.it

  70. A DVERSARIAL E XAMPLES D ETECTION HiDDeN: Hiding Data With Deep Networks Jiren Zhu, Russell Kaplan, Justin Johnson, Li Fei-Fei fabrizio.falchi@cnr.it

  71. fabrizio.falchi@cnr.it

  72. fabrizio.falchi@cnr.it

  73. T HANKS ! Questions are welcomed Fabrizio Falchi fabrizio.falchi@cnr.it fabrizio.falchi@cnr.it

  74. C ONCLUSIONS • Machine Learning and Deep Learning in particular can be attacked o Slightly modifying images but also in real world o Even if our neural network is a black box for the enemy • Many approaches have been proposed to make DL more robust • Adversarial examples detection is its early stages • We need adversary-aware machine learning fabrizio.falchi@cnr.it

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend