stronger and faster wasserstein adversarial attacks
play

Stronger and Faster Wasserstein Adversarial Attacks Kaiwen Wu - PowerPoint PPT Presentation

Stronger and Faster Wasserstein Adversarial Attacks Kaiwen Wu kaiwen.wu@uwaterloo.ca Joint work with Allen Wang and Yaoliang Yu K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 1 / 18 Adversarial Examples Adversarial


  1. Stronger and Faster Wasserstein Adversarial Attacks Kaiwen Wu kaiwen.wu@uwaterloo.ca Joint work with Allen Wang and Yaoliang Yu K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 1 / 18

  2. Adversarial Examples Adversarial examples: (Goodfellow et al. 2015) Generating adversarial examples: maximize ℓ ( f ( x adv ) , y ) x adv subject to x adv ≈ x K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 2 / 18

  3. How “Similar” Is Similar? How to quantify x adv ≈ x ? � x − x adv � p ≤ ǫ (Szegedy et al. 2014) point-wise function (Laidlaw et al. 2019) geometric transformation (Engstrom et al. 2019) Wasserstein distance (Wong et al. 2019) ... Our contributions stronger and faster Wasserstein adversarial attacks higher robust accuracy using adversarial training K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 3 / 18

  4. What is Wasserstein Distance? Π ≥ 0 � Π , C � s . t . Π 1 = x , Π ⊤ 1 = z W ( x , z ) = min x ∈ R n and z ∈ R n : input images Π ∈ R n × n : transportation matrix C ∈ R n × n : transportation cost cost Π ij × C ij z x K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 4 / 18

  5. Applications across Different Domains (Arjovsky et al. 2017; Rabin et al. 2014; Solomon et al. 2015) K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 5 / 18

  6. Why Wasserstein Distance? Captures geometry in image space, e.g . translation, rotation ǫ = 0 . 05 ǫ = 0 . 10 ǫ = 0 . 20 ǫ = 0 . 40 ℓ ∞ ǫ = 0 . 50 ǫ = 1 . 00 ǫ = 2 . 00 ǫ = 4 . 00 ℓ 2 ǫ = 0 . 05 ǫ = 0 . 10 ǫ = 0 . 20 ǫ = 0 . 40 Wasserstein predict: 4 predict: 9

  7. Why Wasserstein Distance? Captures geometry in image space, e.g . translation, rotation ǫ = 0 . 05 ǫ = 0 . 10 ǫ = 0 . 20 ǫ = 0 . 40 ℓ ∞ ǫ = 0 . 50 ǫ = 1 . 00 ǫ = 2 . 00 ǫ = 4 . 00 ℓ 2 ǫ = 0 . 05 ǫ = 0 . 10 ǫ = 0 . 20 ǫ = 0 . 40 Wasserstein predict: 4 predict: 9 K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 6 / 18

  8. Computing Wasserstein Adversarial Examples Search for adversarial examples: ℓ ( x adv ) maximize x adv subject to W ( x , x adv ) ≤ ǫ K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 7 / 18

  9. Computing Wasserstein Adversarial Examples Search for adversarial examples: ℓ ( x adv ) maximize x adv subject to W ( x , x adv ) ≤ ǫ Alternatively, search for transportation matrix: ℓ (Π ⊤ 1 ) maximize Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ Then, recover adversarial examples: x adv = Π ⊤ 1 K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 7 / 18

  10. Optimization in Transportation Matrix K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 8 / 18

  11. Optimization in Transportation Matrix ∇ Π ℓ (Π) ǫ (a) projected gradient 1 2 � Π − G � 2 minimize F Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 8 / 18

  12. Optimization in Transportation Matrix ∇ Π ℓ (Π) ǫ (a) projected gradient (b) Frank-Wolfe (Jaggi 2011) 1 2 � Π − G � 2 � Π , H � minimize minimize F Π ≥ 0 Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ subject to Π 1 = x , � Π , C � ≤ ǫ K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 8 / 18

  13. Optimization in Transportation Matrix ∇ Π ℓ (Π) ǫ (a) projected gradient (b) Frank-Wolfe (Jaggi 2011) 1 2 � Π − G � 2 � Π , H � minimize minimize F Π ≥ 0 Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ subject to Π 1 = x , � Π , C � ≤ ǫ For n dimensional images, Π has n 2 variables... K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 8 / 18

  14. Solve Projection in PGD 2 � Π − G � 2 1 minimize F Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 9 / 18

  15. Solve Projection in PGD 2 � Π − G � 2 1 minimize F Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ The Lagrange dual can be simplified as a univariate problem g ( λ ) maximize λ ≥ 0 K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 9 / 18

  16. Solve Projection in PGD 2 � Π − G � 2 1 minimize F Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ The Lagrange dual can be simplified as a univariate problem g ( λ ) maximize λ ≥ 0 No closed-form expression... K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 9 / 18

  17. Solve Projection in PGD 2 � Π − G � 2 1 minimize F Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ The Lagrange dual can be simplified as a univariate problem g ( λ ) maximize λ ≥ 0 No closed-form expression... But g ′ ( λ ) can be evaluated in O ( n 2 log n ) time Proposition 0 ≤ λ ⋆ ≤ 2 � vec ( G ) � ∞ + � x � ∞ min i � = j { C ij } K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 9 / 18

  18. Bisection on the Dual maximize g ( λ ) λ ≥ 0 Converge to high precision ≤ 20 iterations in practice. g ( λ ) λ

  19. Bisection on the Dual maximize g ( λ ) λ ≥ 0 Converge to high precision ≤ 20 iterations in practice. g ( λ ) λ ⋆ λ

  20. Bisection on the Dual maximize g ( λ ) λ ≥ 0 Converge to high precision ≤ 20 iterations in practice. g ( λ ) 2 � vec ( G ) � ∞ + � x � ∞ λ ⋆ min i � = j { C ij } λ

  21. Bisection on the Dual maximize g ( λ ) λ ≥ 0 Converge to high precision ≤ 20 iterations in practice. g ( λ ) 2 � vec ( G ) � ∞ + � x � ∞ λ ⋆ min i � = j { C ij } λ 0 K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 10 / 18

  22. Solve Linear Minimization in Frank-Wolfe � Π , H � minimize Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 11 / 18

  23. Solve Linear Minimization in Frank-Wolfe � Π , H � minimize Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ The Lagrange dual can be simplified as a univariate problem maximize g ( λ ) λ ≥ 0 K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 11 / 18

  24. Solve Linear Minimization in Frank-Wolfe � Π , H � minimize Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ The Lagrange dual can be simplified as a univariate problem maximize g ( λ ) λ ≥ 0 Bound on the optimum: 0 ≤ λ ⋆ ≤ 2 � vec ( H ) � ∞ min i � = j { C ij } K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 11 / 18

  25. Solve Linear Minimization in Frank-Wolfe � Π , H � minimize Π ≥ 0 subject to Π 1 = x , � Π , C � ≤ ǫ The Lagrange dual can be simplified as a univariate problem maximize g ( λ ) λ ≥ 0 Bound on the optimum: 0 ≤ λ ⋆ ≤ 2 � vec ( H ) � ∞ min i � = j { C ij } Does not work... ◮ difficult to recover primal solution ◮ severe numerical instability K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 11 / 18

  26. Entropic Regularization n n � � � Π , H � + γ Π ij log Π ij minimize Π ≥ 0 i =1 j =1 subject to Π 1 = x , � Π , C � ≤ ǫ K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 12 / 18

  27. Entropic Regularization n n � � � Π , H � + γ Π ij log Π ij minimize Π ≥ 0 i =1 j =1 subject to Π 1 = x , � Π , C � ≤ ǫ Closed-form expression to recover primal solution K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 12 / 18

  28. Entropic Regularization n n � � � Π , H � + γ Π ij log Π ij minimize Π ≥ 0 i =1 j =1 subject to Π 1 = x , � Π , C � ≤ ǫ Closed-form expression to recover primal solution Entropic regularization introduces approximation error K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 12 / 18

  29. Entropic Regularization n n � � � Π , H � + γ Π ij log Π ij minimize Π ≥ 0 i =1 j =1 subject to Π 1 = x , � Π , C � ≤ ǫ Closed-form expression to recover primal solution Entropic regularization introduces approximation error But the approximation error is guaranteed to be small K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 12 / 18

  30. Exploit Sparsity Local transportation constraint (Wong et al. 2019) ⇒ structured sparsity in Π Per iteration cost is reduced to O ( n ) by exploiting sparsity K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 13 / 18

  31. Comparison adversarial accuracy on CIFAR-10 (standard training) 80 60 40 20 0 ǫ = 0 . 001 0.002 0.003 0.004 0.005 Wong et al. (2019) Dual Proj.(ours) Dual LMO(ours) K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 14 / 18

  32. Comparison adversarial accuracy on CIFAR-10 (standard training) 80 60 40 20 0 ǫ = 0 . 001 0.002 0.003 0.004 0.005 Wong et al. (2019) Dual Proj.(ours) Dual LMO(ours) time per iteration in ms iterations 80 60 20 40 10 20 0 0 K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 14 / 18

  33. Entropic Regularization Reflects Shapes

  34. Entropic Regularization Reflects Shapes

  35. Entropic Regularization Reflects Shapes K.Wu, A.Wang and Y.Yu Wasserstein Adversarial Attacks July 29, 2020 15 / 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend