Towards Attack-Agnostic Defense for 2D and 3D Recognition Hao Su - - PowerPoint PPT Presentation

towards attack agnostic defense for 2d and 3d recognition
SMART_READER_LITE
LIVE PREVIEW

Towards Attack-Agnostic Defense for 2D and 3D Recognition Hao Su - - PowerPoint PPT Presentation

Towards Attack-Agnostic Defense for 2D and 3D Recognition Hao Su Workshop on Adversarial Machine Learning in Real-World Computer Vision Systems Long Beach, CA, USA 1 Outline Background and Motivation Project-based Defense Mechanism


slide-1
SLIDE 1

Towards Attack-Agnostic Defense for 2D and 3D Recognition

Hao Su

1

Workshop on Adversarial Machine Learning in Real-World Computer Vision Systems Long Beach, CA, USA

slide-2
SLIDE 2

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Summary

2

slide-3
SLIDE 3

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Summary

3

slide-4
SLIDE 4

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

4

  • Deep learning has made groundbreaking achievements on…
  • However, deep learning faces robustness and security challenges
slide-5
SLIDE 5

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Classic Adversarial Attacks

  • FGSM: Fast Gradient Sign Method
  • BIM: Basic Iterative Method
  • DeepFool
  • C&W

Clean FGSM BIM DeepFool C&W

5

slide-6
SLIDE 6

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • The meta algorithm is to optimize the following score:

Defense Mechanisms

6 ack: Towards Deep Learning Models Resistant to Adversarial Attacks, Mądry et al.

minimize E(x,y)∼D[max

δ∈S L(θ, x + δ, y)]

<latexit sha1_base64="YUbJu1viQUpHdj1X5q1XjSmTy8=">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</latexit>
slide-7
SLIDE 7

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Adversarial Training

  • Approximate the max of in the vicinity of training data by

gradient-based optimization

7

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

L

<latexit sha1_base64="ZnfaHojXYBGPV7LW5qdtkR/Yrwc=">AB6HicbVA9SwNBEJ2LXzF+RS1tFoNgFe6ioIVFwMbCIgHzAckR9jZzyZq9vWN3Twghv8DGQhFbf5Kd/8ZNcoUmPh4vDfDzLwgEVwb1/12cmvrG5tb+e3Czu7e/kHx8Kip41QxbLBYxKodUI2CS2wYbgS2E4U0CgS2gtHtzG89odI8lg9mnKAf0YHkIWfUWKl+3yuW3LI7B1klXkZKkKHWK351+zFLI5SGCap1x3MT40+oMpwJnBa6qcaEshEdYMdSPU/mR+6JScWaVPwljZkobM1d8TExpPY4C2xlRM9TL3kz8z+ukJrz2J1wmqUHJFovCVBATk9nXpM8VMiPGlCmuL2VsCFVlBmbTcG4C2/vEqalbJ3Ua7UL0vVmyOPJzAKZyDB1dQhTuoQMYIDzDK7w5j86L8+58LFpzTjZzDH/gfP4AowmMzg=</latexit>
slide-8
SLIDE 8

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Adversarial Training

  • Approximate the max of in the vicinity of training data by

gradient-based optimization

  • Can derive adversarial training methods such as FGSM, PGD, …

8

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

L

<latexit sha1_base64="ZnfaHojXYBGPV7LW5qdtkR/Yrwc=">AB6HicbVA9SwNBEJ2LXzF+RS1tFoNgFe6ioIVFwMbCIgHzAckR9jZzyZq9vWN3Twghv8DGQhFbf5Kd/8ZNcoUmPh4vDfDzLwgEVwb1/12cmvrG5tb+e3Czu7e/kHx8Kip41QxbLBYxKodUI2CS2wYbgS2E4U0CgS2gtHtzG89odI8lg9mnKAf0YHkIWfUWKl+3yuW3LI7B1klXkZKkKHWK351+zFLI5SGCap1x3MT40+oMpwJnBa6qcaEshEdYMdSPU/mR+6JScWaVPwljZkobM1d8TExpPY4C2xlRM9TL3kz8z+ukJrz2J1wmqUHJFovCVBATk9nXpM8VMiPGlCmuL2VsCFVlBmbTcG4C2/vEqalbJ3Ua7UL0vVmyOPJzAKZyDB1dQhTuoQMYIDzDK7w5j86L8+58LFpzTjZzDH/gfP4AowmMzg=</latexit>
slide-9
SLIDE 9

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Adversarial Training

  • Approximate the max of in the vicinity of training data by

gradient-based optimization

  • Can derive adversarial training methods such as FGSM, PGD, …
  • Extensively and actively studied direction

9

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

L

<latexit sha1_base64="ZnfaHojXYBGPV7LW5qdtkR/Yrwc=">AB6HicbVA9SwNBEJ2LXzF+RS1tFoNgFe6ioIVFwMbCIgHzAckR9jZzyZq9vWN3Twghv8DGQhFbf5Kd/8ZNcoUmPh4vDfDzLwgEVwb1/12cmvrG5tb+e3Czu7e/kHx8Kip41QxbLBYxKodUI2CS2wYbgS2E4U0CgS2gtHtzG89odI8lg9mnKAf0YHkIWfUWKl+3yuW3LI7B1klXkZKkKHWK351+zFLI5SGCap1x3MT40+oMpwJnBa6qcaEshEdYMdSPU/mR+6JScWaVPwljZkobM1d8TExpPY4C2xlRM9TL3kz8z+ukJrz2J1wmqUHJFovCVBATk9nXpM8VMiPGlCmuL2VsCFVlBmbTcG4C2/vEqalbJ3Ua7UL0vVmyOPJzAKZyDB1dQhTuoQMYIDzDK7w5j86L8+58LFpzTjZzDH/gfP4AowmMzg=</latexit>
slide-10
SLIDE 10

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • For each , we have to run the optimization, which is costly;
  • For each , we have to create sufficient adversarial perturbations in , as

the model evolves;

Limitation of Adversarial Training

10

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

θ

<latexit sha1_base64="NxezZAi/2OcGxjA9seuckw+VtMA=">AB7XicbVA9SwNBEJ2LXzF+RS1tFoNgFe6ioIVFwMYygvmA5Ah7m71kzd7esTsnhCP/wcZCEVv/j53/xk1yhSY+GHi8N8PMvCRwqDrfjuFtfWNza3idmlnd2/oHx41DJxqhlvsljGuhNQw6VQvIkCJe8kmtMokLwdjG9nfvuJayNi9YCThPsRHSoRCkbRSq0ejSfrniVt05yCrxclKBHI1+as3iFkacYVMUmO6npugn1GNgk+LfVSwxPKxnTIu5YqGnHjZ/Nrp+TMKgMSxtqWQjJXf09kNDJmEgW2M6I4MsveTPzP6YXvuZUEmKXLHFojCVBGMye50MhOYM5cQSyrSwtxI2opoytAGVbAje8surpFWrehfV2v1lpX6Tx1GEziFc/DgCupwBw1oAoNHeIZXeHNi58V5dz4WrQUnzmGP3A+fwCjd48m</latexit>

S

<latexit sha1_base64="o1ngUyig/1Er59mybNEbgK7/QbI=">AB8nicbVDLSgMxFL1TX7W+qi7dBIvgqsxUQRcuCm5cVrQPmA4lk2ba0EwyJBmhDP0MNy4UcevXuPNvzLSz0NYDgcM595JzT5hwpo3rfjultfWNza3ydmVnd2/oHp41NEyVYS2ieRS9UKsKWeCtg0znPYSRXEctoNJ7e532iSjMpHs0oUGMR4JFjGBjJb8fYzMmGcPs0G15tbdOdAq8QpSgwKtQfWrP5QkjakwhGOtfc9NTJBhZRjhdFbp5omEzwiPqWChxTHWTzyDN0ZpUhiqSyTxg0V39vZDjWehqHdjKPqJe9XPzP81MTXQcZE0lqCLj6KUIyNRfj8aMkWJ4VNLMFHMZkVkjBUmxrZUsSV4yevk6j7l3UG/eXteZNUcZTuAUzsGDK2jCHbSgDQkPMrvDnGeXHenY/FaMkpdo7hD5zPH4sokWc=</latexit>
slide-11
SLIDE 11

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • For each , we have to run the optimization, which is costly;
  • For each , we have to create sufficient adversarial perturbations in , as

the model evolves.

Limitation of Adversarial Training

11

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

x

<latexit sha1_base64="hL+FaLtOT9luwfLW3Ut08xl3Pcw=">AB6HicbVDLTgJBEOzF+IL9ehlIjHxRHbRI9ELx4hkUcCGzI79MLI7OxmZtZICF/gxYPGePWTvPk3DrAHBSvpFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsG4EthOFNAoEtoLR7cxvPaLSPJb3ZpygH9GB5CFn1Fip/tQrltyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmpWyd1Gu1C9L1ZsjycwCmcgwdXUIU7qEDGCA8wyu8OQ/Oi/PufCxac042cwx/4Hz+AOeHjQA=</latexit>

θ

<latexit sha1_base64="NxezZAi/2OcGxjA9seuckw+VtMA=">AB7XicbVA9SwNBEJ2LXzF+RS1tFoNgFe6ioIVFwMYygvmA5Ah7m71kzd7esTsnhCP/wcZCEVv/j53/xk1yhSY+GHi8N8PMvCRwqDrfjuFtfWNza3idmlnd2/oHx41DJxqhlvsljGuhNQw6VQvIkCJe8kmtMokLwdjG9nfvuJayNi9YCThPsRHSoRCkbRSq0ejSfrniVt05yCrxclKBHI1+as3iFkacYVMUmO6npugn1GNgk+LfVSwxPKxnTIu5YqGnHjZ/Nrp+TMKgMSxtqWQjJXf09kNDJmEgW2M6I4MsveTPzP6YXvuZUEmKXLHFojCVBGMye50MhOYM5cQSyrSwtxI2opoytAGVbAje8surpFWrehfV2v1lpX6Tx1GEziFc/DgCupwBw1oAoNHeIZXeHNi58V5dz4WrQUnzmGP3A+fwCjd48m</latexit>

S

<latexit sha1_base64="o1ngUyig/1Er59mybNEbgK7/QbI=">AB8nicbVDLSgMxFL1TX7W+qi7dBIvgqsxUQRcuCm5cVrQPmA4lk2ba0EwyJBmhDP0MNy4UcevXuPNvzLSz0NYDgcM595JzT5hwpo3rfjultfWNza3ydmVnd2/oHp41NEyVYS2ieRS9UKsKWeCtg0znPYSRXEctoNJ7e532iSjMpHs0oUGMR4JFjGBjJb8fYzMmGcPs0G15tbdOdAq8QpSgwKtQfWrP5QkjakwhGOtfc9NTJBhZRjhdFbp5omEzwiPqWChxTHWTzyDN0ZpUhiqSyTxg0V39vZDjWehqHdjKPqJe9XPzP81MTXQcZE0lqCLj6KUIyNRfj8aMkWJ4VNLMFHMZkVkjBUmxrZUsSV4yevk6j7l3UG/eXteZNUcZTuAUzsGDK2jCHbSgDQkPMrvDnGeXHenY/FaMkpdo7hD5zPH4sokWc=</latexit>

Training is costly!

slide-12
SLIDE 12

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • Adversarially trained models tend to overfit the attacking method (even

parameters) used in training

Limitation of Adversarial Training (II)

\begin{tabular}{|l|l|l|}

slide-13
SLIDE 13

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • Adversarially trained models tend to overfit the attacking method (even

parameters) used in training

Limitation of Adversarial Training (II)

\begin{tabular}{|l|l|l|}

Logit Pairing Methods Can Fool Gradient-Based Attacks, by Mosbach et al.

Defense success rate when varying attacker PGD iteration

L∞ = 16.0

<latexit sha1_base64="gMBJ5vBI0xrjFc073YuQXMQ/BLQ=">AB+HicbVBNS8NAEN3Ur1o/GvXoJVgETyGpol6EohcPHirYD2hD2Gw37dLNJuxOhBj6S7x4UMSrP8Wb/8Ztm4O2Ph4vDfDzLwg4UyB43wbpZXVtfWN8mZla3tnt2ru7bdVnEpCWyTmsewGWFHOBG0BA067iaQ4CjtBObqd95pFKxWDxAlAvwkPBQkYwaMk3q3d+3mcihGxy5Z7bjm/WHNuZwVombkFqEDTN7/6g5ikERVAOFaq5zoJeDmWwAink0o/VTBZIyHtKepwBFVXj47fGIda2VghbHUJcCaqb8nchwplUWB7owjNSiNxX/83ophJdezkSAhVkvihMuQWxNU3BGjBJCfBME0wk07daZIQlJqCzqugQ3MWXl0m7brundv3+rNa4LuIo0N0hE6Qiy5QA92iJmohglL0jF7Rm/FkvBjvxse8tWQUMwfoD4zPH6y7knA=</latexit>

Note: adv. training with 10 iterations and

Iter 10 400 CIFAR-10 16.0 6.7 Tiny-ImageNet 25.5 16.3

<latexit sha1_base64="J6u4vQw4b2tNmCAHnLHvPTi5jIc=">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</latexit>
slide-14
SLIDE 14

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • Adversarially trained models tend to overfit the attacking method (even

parameters) used in training

Limitation of Adversarial Training (II)

\begin{tabular}{|l|l|l|}

Logit Pairing Methods Can Fool Gradient-Based Attacks, by Mosbach et al.

Defense success rate when varying attacker PGD iteration

L∞ = 16.0

<latexit sha1_base64="gMBJ5vBI0xrjFc073YuQXMQ/BLQ=">AB+HicbVBNS8NAEN3Ur1o/GvXoJVgETyGpol6EohcPHirYD2hD2Gw37dLNJuxOhBj6S7x4UMSrP8Wb/8Ztm4O2Ph4vDfDzLwg4UyB43wbpZXVtfWN8mZla3tnt2ru7bdVnEpCWyTmsewGWFHOBG0BA067iaQ4CjtBObqd95pFKxWDxAlAvwkPBQkYwaMk3q3d+3mcihGxy5Z7bjm/WHNuZwVombkFqEDTN7/6g5ikERVAOFaq5zoJeDmWwAink0o/VTBZIyHtKepwBFVXj47fGIda2VghbHUJcCaqb8nchwplUWB7owjNSiNxX/83ophJdezkSAhVkvihMuQWxNU3BGjBJCfBME0wk07daZIQlJqCzqugQ3MWXl0m7brundv3+rNa4LuIo0N0hE6Qiy5QA92iJmohglL0jF7Rm/FkvBjvxse8tWQUMwfoD4zPH6y7knA=</latexit>

Note: adv. training with 10 iterations and

Iter 10 400 CIFAR-10 16.0 6.7 Tiny-ImageNet 25.5 16.3

<latexit sha1_base64="J6u4vQw4b2tNmCAHnLHvPTi5jIc=">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</latexit>

Has to assume the attacking algorithm!

slide-15
SLIDE 15

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Practically,

  • We want a defense mechanism that is
  • Fast to train and test
  • Agnostic to attacking algorithms

15

slide-16
SLIDE 16

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Conclusion

16

slide-17
SLIDE 17

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

  • Observation: Higher dimensional data is more vulnerable to

adversarial attacks ( is “larger” and defense gets harder)

Other Strategies?

  • Revisit our goal:

17

minimize E(x,y)∼D[max

δ∈S L(θ, x + δ, y)]

<latexit sha1_base64="YUbJu1viQUpHdj1X5q1XjSmTy8=">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</latexit>

S

<latexit sha1_base64="s0ORvqxeEX0PpYtJdKPahu5m4g=">AB8nicbVDLSgMxFL1TX7W+qi7dBIvgqsxUQZdFNy4r2gdMh5JM21oJhmSjFCGfoYbF4q49Wvc+Tdm2lo64HA4Zx7ybknTDjTxnW/ndLa+sbmVnm7srO7t39QPTzqaJkqQtEcql6IdaUM0HbhlOe4miOA457YaT29zvPlGlmRSPZprQIMYjwSJGsLGS34+xGRPMs4fZoFpz6+4caJV4BalBgdag+tUfSpLGVBjCsda+5yYmyLAyjHA6q/RTRNMJnhEfUsFjqkOsnkGTqzyhBFUtknDJqrvzcyHGs9jUM7mUfUy14u/uf5qYmug4yJDVUkMVHUcqRkSi/Hw2ZosTwqSWYKGazIjLGChNjW6rYErzlk1dJp1H3LuqN+8ta86aowncArn4MEVNOEOWtAGAhKe4RXeHO8O/Ox2K05BQ7x/AHzucPjPaRbQ=</latexit>
slide-18
SLIDE 18

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Empirical Evidence I

18

Accuracy on CIFAR-10

32 × 32 64 × 64 Clean 95.33 95.53

<latexit sha1_base64="Yrg8Oogm28Gt0MAV7BSNenau0fg=">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</latexit>
  • Attacking Undefended Model
slide-19
SLIDE 19

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Empirical Evidence I

19

Accuracy on CIFAR-10

32 × 32 64 × 64 Clean 95.33 95.53 PGD (✏ = 2) 23.96 1.1 PGD (✏ = 4) 3.92

<latexit sha1_base64="Yrg8Oogm28Gt0MAV7BSNenau0fg=">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</latexit>

<latexit sha1_base64="vX2H2PJby+L3YMPlhuH/CDR1otk=">AB83icdVDLSgMxFM3UV62vqks3wSK4GjJ9oN0V3bisYB/QGUomvdOGZh4kGaEM/Q03LhRx68+482/MtBVU9EDgcM693JPjJ4IrTciHVhb39jcKm6Xdnb39g/Kh0dFaeSQYfFIpZ9nyoQPIKO5lpAP5FAQ19Az59e537vHqTicXSnZwl4IR1HPOCMaiO5bkj1xA8ydwzYblC7Cap1moNTOw6qTkOMcSpN5oNgh2bLFBK7SH5Xd3FLM0hEgzQZUaOCTRXkal5kzAvOSmChLKpnQMA0MjGoLyskXmOT4zygHsTQv0nihft/IaKjULPTNZJ5R/fZy8S9vkOrg0st4lKQaIrY8FKQC6xjnBeARl8C0mBlCmeQmK2YTKinTpqaSKeHrp/h/0q3aTs2u3tYratVHUV0gk7ROXLQBWqhG9RGHcRQgh7QE3q2UuvRerFel6MFa7VzjH7AevsEq0mSGw=</latexit>
  • Attacking Undefended Model
  • Lower-dimensional data seems more robust to attacks
slide-20
SLIDE 20

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Empirical Evidence II

20

  • Attacking Defended Model (adversarially trained by PGD with )

\begin{tabular}{c|cccc}

✏ = 1

<latexit sha1_base64="teYXVFJ3fq7ZJSWwvuhScrfpYA=">AB8XicbZDLSgMxFIYz9VbrepSkGARXJWZutCFYsGNyxbsBduhZNLTNjSTDElGKEOXvoEbF4q49QXc+grufAZ9CNPLQlt/CHz8/znknBNEnGnjup9OamFxaXklvZpZW9/Y3Mpu71S1jBWFCpVcqnpANHAmoGKY4VCPFJAw4FAL+pejvHYLSjMprs0gAj8kXcE6jBJjrZsmRJpxKc69Vjbn5t2x8Dx4U8hdvH/d7b+Vv0ut7EezLWkcgjCUE60bnhsZPyHKMphmGnGiJC+6QLDYuChKD9ZDzxEB9ap407UtknDB67vzsSEmo9CANbGRLT07PZyPwva8Smc+onTESxAUEnH3Vijo3Eo/Vxmymghg8sEKqYnRXTHlGEGnukjD2CN7vyPFQLe84Xyi7ueIZmiN9tABOkIeOkFdIVKqIoEugePaInRzsPzrPzMilNOdOeXfRHzusPVIWVHw=</latexit>
slide-21
SLIDE 21

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Empirical Evidence II

21

  • Attacking Defended Model (adversarially trained by PGD with )

\begin{tabular}{c|cccc}

✏ = 1

<latexit sha1_base64="teYXVFJ3fq7ZJSWwvuhScrfpYA=">AB8XicbZDLSgMxFIYz9VbrepSkGARXJWZutCFYsGNyxbsBduhZNLTNjSTDElGKEOXvoEbF4q49QXc+grufAZ9CNPLQlt/CHz8/znknBNEnGnjup9OamFxaXklvZpZW9/Y3Mpu71S1jBWFCpVcqnpANHAmoGKY4VCPFJAw4FAL+pejvHYLSjMprs0gAj8kXcE6jBJjrZsmRJpxKc69Vjbn5t2x8Dx4U8hdvH/d7b+Vv0ut7EezLWkcgjCUE60bnhsZPyHKMphmGnGiJC+6QLDYuChKD9ZDzxEB9ap407UtknDB67vzsSEmo9CANbGRLT07PZyPwva8Smc+onTESxAUEnH3Vijo3Eo/Vxmymghg8sEKqYnRXTHlGEGnukjD2CN7vyPFQLe84Xyi7ueIZmiN9tABOkIeOkFdIVKqIoEugePaInRzsPzrPzMilNOdOeXfRHzusPVIWVHw=</latexit>

Accuracy on CIFAR-10

PGD (✏ = 1) 32×32 83.7 64×64 80.5

<latexit sha1_base64="NAHypyY/gt3zgHvZjdTdFL9Bjcs=">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</latexit>
  • Lower-dimensional data seems to be easier to defend
slide-22
SLIDE 22

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Empirical Evidence II

22

  • Attacking Defended Model (adversarially trained by PGD with )

\begin{tabular}{c|cccc}

✏ = 1

<latexit sha1_base64="teYXVFJ3fq7ZJSWwvuhScrfpYA=">AB8XicbZDLSgMxFIYz9VbrepSkGARXJWZutCFYsGNyxbsBduhZNLTNjSTDElGKEOXvoEbF4q49QXc+grufAZ9CNPLQlt/CHz8/znknBNEnGnjup9OamFxaXklvZpZW9/Y3Mpu71S1jBWFCpVcqnpANHAmoGKY4VCPFJAw4FAL+pejvHYLSjMprs0gAj8kXcE6jBJjrZsmRJpxKc69Vjbn5t2x8Dx4U8hdvH/d7b+Vv0ut7EezLWkcgjCUE60bnhsZPyHKMphmGnGiJC+6QLDYuChKD9ZDzxEB9ap407UtknDB67vzsSEmo9CANbGRLT07PZyPwva8Smc+onTESxAUEnH3Vijo3Eo/Vxmymghg8sEKqYnRXTHlGEGnukjD2CN7vyPFQLe84Xyi7ueIZmiN9tABOkIeOkFdIVKqIoEugePaInRzsPzrPzMilNOdOeXfRHzusPVIWVHw=</latexit>

Accuracy on CIFAR-10

PGD (✏ = 1) PGD (✏ = 2) PGD (✏ = 4) 32×32 83.7 77.3 47.8 64×64 80.5 66.4 35.9 Gap 3.2 10.9 11.9

<latexit sha1_base64="NAHypyY/gt3zgHvZjdTdFL9Bjcs=">ADVXicjVLPa9swFJadruyH0234y5i9UZ7EXacxil0o7BCxy7LYGkLUQiyoiQismwkuRC8/Dn7h3oZO+y+P6GXQuWkG2uSQx+I9+l7+vRJjxdngmvj+78ct7LxaPx1pPq02fPX2zXdl6e6TRXlHVoKlJ1ERPNBJesY7gR7CJTjCSxYOfx5GNZP79kSvNUfjPTjPUSMpJ8yCkxlurvOBOIYzbisjAkzgVRs4J+pzZmVXg/8Lj0WGbhO9g+PYF7HmaZ5iKV7wNvf5WsryMb3j7GD7MJ6x42PGHaC+v2olaIpuiCIU2NSLUgqs3NRt/Nc1GqfHRgU3NJip34QE6XKNZ735KslKCSuvAt0KbAnT4ADlmcvCvs9V+bdH/jzgKgjuwO7xl8f6J/fP9r92hUepDRPmDRUEK27gZ+ZXkGU4VSwWRXnmWETsiIdS2UxP62V8ynYgbfWmYAh6mySxo4Z/9XFCTReprE9mRCzFgv10pyXa2bm2GrV3CZ5YZJujAa5gKaFJYjBgdcMWrE1AJCFbdvhXRMFKHGDmLZhGD5y6vgrI4C2/CvthtHYBFb4DV4A/ZACJwD6BNugA6lw5167ju5P96ayUdlcHWdO80rcC8q27dCn+CT</latexit>
  • Lower-dimensional data seems to be easier to defend
  • Defending in lower resolution seems to be more attack agnostic
slide-23
SLIDE 23

Idea

Project adversarial examples to a low-dimensional data manifold that is easier to defend

E(x,y)∼D[max

δ∈S L(θ, Tψ(x + δ), y)] ≤ E(x,y)∼D[max δ∈S L(θ, x + δ, y)]

<latexit sha1_base64="tVB1wknsykIBXKtCVmbEMu6L1+A=">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</latexit>
slide-24
SLIDE 24

Idea

Project adversarial examples to a low-dimensional data manifold that is easier to defend

E(x,y)∼D[max

δ∈S L(θ, Tψ(x + δ), y)] ≤ E(x,y)∼D[max δ∈S L(θ, x + δ, y)]

<latexit sha1_base64="tVB1wknsykIBXKtCVmbEMu6L1+A=">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</latexit>

How to design the family of ?

Tψ(·)

<latexit sha1_base64="pZY3f7odJQvoFfxJqyVs+to54WE=">ACBnicbVDLSsNAFJ34rPUVdSnCYBHqpiRV0GXRjcsKfUETwmQyaYdOJmFmIpSQlRt/xY0LRdz6De78G6dpFtp64MLhnHtn7j1+wqhUlvVtrKyurW9sVraq2zu7e/vmwWFPxqnApItjFouBjyRhlJOuoqRQSIinxG+v7kdub3H4iQNOYdNU2IG6ERpyHFSGnJM08yp3gkEyTIYcfLnETSvO7gIFbnuWfWrIZVAC4TuyQ1UKLtmV9OEOM0IlxhqQc2lai3AwJRTEjedVJUkQnqARGWrKUSkmxUb5PBMKwEMY6GLK1iovycyFEk5jXzdGSE1loveTPzPG6YqvHYzypNUEY7nH4UpgyqGs0xgQAXBik01QVhQvSvEYyQVjq5qg7BXjx5mfSaDfui0by/rLVuyjgq4BicgjqwRVogTvQBl2AwSN4Bq/gzXgyXox342PeumKUM0fgD4zPH7JymUE=</latexit>
slide-25
SLIDE 25

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Some Inspiration from Human Vision System

25

slide-26
SLIDE 26

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Some Inspiration from Human Vision System

26

slide-27
SLIDE 27

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Some Inspiration from Human Vision System

27

Gist first, details afterwards

slide-28
SLIDE 28

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Misperception v.s. Ambiguity

(a) Abnormal. Typical reason: recognition obscured by details. (b) Ambiguous. Obfuscated labels.

bird -> people ship -> bird dog -> fish

bird or bicycle? 4 or 6? 0 or 6? unobvious

28

slide-29
SLIDE 29

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Conclusion

29

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-30
SLIDE 30

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Goal

  • Build the space of natural data (2D images, 3D shapes, …),

which only focus on the gist

  • Project the data to this low-dimensional space and wipe out

details

30

slide-31
SLIDE 31

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Conclusion

31

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-32
SLIDE 32

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Idea

Build a piece-wise linear image space for natural images

32

Tψ(·)

<latexit sha1_base64="pZY3f7odJQvoFfxJqyVs+to54WE=">ACBnicbVDLSsNAFJ34rPUVdSnCYBHqpiRV0GXRjcsKfUETwmQyaYdOJmFmIpSQlRt/xY0LRdz6De78G6dpFtp64MLhnHtn7j1+wqhUlvVtrKyurW9sVraq2zu7e/vmwWFPxqnApItjFouBjyRhlJOuoqRQSIinxG+v7kdub3H4iQNOYdNU2IG6ERpyHFSGnJM08yp3gkEyTIYcfLnETSvO7gIFbnuWfWrIZVAC4TuyQ1UKLtmV9OEOM0IlxhqQc2lai3AwJRTEjedVJUkQnqARGWrKUSkmxUb5PBMKwEMY6GLK1iovycyFEk5jXzdGSE1loveTPzPG6YqvHYzypNUEY7nH4UpgyqGs0xgQAXBik01QVhQvSvEYyQVjq5qg7BXjx5mfSaDfui0by/rLVuyjgq4BicgjqwRVogTvQBl2AwSN4Bq/gzXgyXox342PeumKUM0fgD4zPH7JymUE=</latexit>

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-33
SLIDE 33

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Dictionary Learning/Sparse Coding

s.t.

33

  • J. Mairal, F

. Bach, and J. Ponce. Sparse modeling for image and vision processing. Foundations and Trends in Computer Graphics and Vision, 8(2-3):85–283, 2014.

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-34
SLIDE 34

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Convolutional Dictionary Learning (CDL)

(pre-learned) dictionary filters: feature map

𝒈𝟐 𝒈𝟑 𝒈𝟒 𝒈𝒍

34

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-35
SLIDE 35

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

35

  • Downsample images to 32×32 to train a DAE

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-36
SLIDE 36

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

36

  • Split the latent space to 4 clusters for CIFAR-10 and

ImageNet-10, and 10 clusters for ImageNet.

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-37
SLIDE 37

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

37

  • Filter number K = 64
  • Filter size S = 8

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-38
SLIDE 38

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

38

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-39
SLIDE 39

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

39

Optimization based transformation

slide-40
SLIDE 40

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Experiments — Denoising Results

ImageNet (Resolution: 224*224):

40

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-41
SLIDE 41

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Experiments — Denoising Results

ImageNet (Resolution: 224*224):

41

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-42
SLIDE 42

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

42

D3 Ours Clean

slide-43
SLIDE 43

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Experiments — Effect of Coding Sparsity

43

Intrinsic tradeoff between image reconstruction quality and defensive robustness.

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-44
SLIDE 44

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Comparison with Other Transformation Methods

44

Defense Clean FGSM BIM

DeepFool

CW No Defense 0.930 0.582 0.180 0.176 0.094 MagNet[1] 0.904 0.615 0.431 0.654 0.485

PixelDefend[2]

0.853 0.681 0.773 0.741 0.758 STL 0.829 0.710 0.745 0.785 0.777 STL(Cluster) 0.836 0.711 0.753 0.796 0.791

On CIFAR-10 by VGG-16

  • Transformation plug-and-play setting (classifier still trained on clean data)

T(·)

<latexit sha1_base64="oLQGDewVlieHTb9JOtiR23Tmf8=">AB73icbVC7SgNBFL3rM8ZX1FKLxSDEJuzGQguLgI1lhLwgu4TZ2dlkyOzMOjMrhCXfELCxUMTW3/AT7PwQeyePQhMPXDicy/3hMkjCrtOF/Wyura+sZmbiu/vbO7t184OGwqkUpMGlgwIdsBUoRThqakbaiSQoDhpBYObid96IFJRwet6mBA/Rj1OI4qRNlK7XvJwKPR5t1B0ys4U9jJx56RYPRl7pe+Pca1b+PRCgdOYcI0ZUqrjOon2MyQ1xYyM8l6qSILwAPVIx1COYqL8bHrvyD4zSmhHQpri2p6qvycyFCs1jAPTGSPdV4veRPzP6Q6uvIzypNUE45ni6KU2VrYk+ftkEqCNRsagrCk5lYb95FEWJuI8iYEd/HlZdKslN2LcuXOpHENM+TgGE6hBC5cQhVuoQYNwMDgEZ7hxbq3nqxX623WumLNZ47gD6z3Hz+zkyQ=</latexit>

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-45
SLIDE 45

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Comparison with Other Transformation Methods

45

Defense Clean FGSM BIM

DeepFool

CW No Defense 0.930 0.582 0.180 0.176 0.094 MagNet[1] 0.904 0.615 0.431 0.654 0.485

PixelDefend[2]

0.853 0.681 0.773 0.741 0.758 STL 0.829 0.710 0.745 0.785 0.777 STL(Cluster) 0.836 0.711 0.753 0.796 0.791

}

Use a network to project

}

  • Solve a sparse coding

Problem

  • Not differentiable
  • Transformation plug-and-play setting (classifier still trained on clean data)

T(·)

<latexit sha1_base64="oLQGDewVlieHTb9JOtiR23Tmf8=">AB73icbVC7SgNBFL3rM8ZX1FKLxSDEJuzGQguLgI1lhLwgu4TZ2dlkyOzMOjMrhCXfELCxUMTW3/AT7PwQeyePQhMPXDicy/3hMkjCrtOF/Wyura+sZmbiu/vbO7t184OGwqkUpMGlgwIdsBUoRThqakbaiSQoDhpBYObid96IFJRwet6mBA/Rj1OI4qRNlK7XvJwKPR5t1B0ys4U9jJx56RYPRl7pe+Pca1b+PRCgdOYcI0ZUqrjOon2MyQ1xYyM8l6qSILwAPVIx1COYqL8bHrvyD4zSmhHQpri2p6qvycyFCs1jAPTGSPdV4veRPzP6Q6uvIzypNUE45ni6KU2VrYk+ftkEqCNRsagrCk5lYb95FEWJuI8iYEd/HlZdKslN2LcuXOpHENM+TgGE6hBC5cQhVuoQYNwMDgEZ7hxbq3nqxX623WumLNZ47gD6z3Hz+zkyQ=</latexit>

On CIFAR-10 by VGG-16

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-46
SLIDE 46

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Comparison with Other Transformation Methods

46

  • If we retrain classifiers on transformed data:

Defense Clean FGSM BIM

DeepFool

CW No Defense 0.930 0.582 0.180 0.176 0.094 MagNet[1] 0.921 0.739 0.771 0.877 0.859

PixelDefend[2]

0.904 0.832 0.852 0.883 0.885 STL 0.900 0.852 0.875 0.884 0.888 STL(Cluster) 0.901 0.857 0.880 0.889 0.890

On CIFAR-10 by VGG-16

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-47
SLIDE 47

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

ImageNet, Top-1 acc, ResNet-50 (Resolution: 224*224):

Comparison with Other Transformation Methods

47

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-48
SLIDE 48

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Limitation: Weak Under White Box Attacks

48

Adversarial Defense by Stratified Convolutional Sparse Coding, Sun et al.

slide-49
SLIDE 49

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Method

49

Optimization based transformation

slide-50
SLIDE 50

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Conclusion

50

Extending Adversarial Attacks AND Defenses To Deep 3D Point Cloud Classifiers, Liu et al, ICIP2019

slide-51
SLIDE 51

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

3D Machine Learning on Different Representations

51

Primitive- based Point Cloud Mesh Volumetric Set Graph Sparse Array Hybrid Data Structure

Extending Adversarial Attacks AND Defenses To Deep 3D Point Cloud Classifiers, Liu et al, ICIP2019

slide-52
SLIDE 52

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

3D Machine Learning on Different Representations

52

Primitive- based Point Cloud Mesh Volumetric Set Graph Sparse Array Hybrid Data Structure

Extending Adversarial Attacks AND Defenses To Deep 3D Point Cloud Classifiers, Liu et al, ICIP2019

slide-53
SLIDE 53

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet — A Deep Network for Sets

53

(1,2,3) (1,1,1) (2,3,2) (2,3,4) simple symmetric function (e.g., max)

PointNet (vanilla)

h g γ

Observe:

f (x1,x2,…,xn) = γ ! g(h(x1),…,h(xn)) is symmetric if is symmetric

g

PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation, CVPR17, Qi et al

slide-54
SLIDE 54

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet — A Deep Network for Sets

54

  • Only skeleton points contributes to the classification score
slide-55
SLIDE 55

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet — A Deep Network for Sets

55

  • Only skeleton points contributes to the classification score
  • Caused by the “max” operator
slide-56
SLIDE 56

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet — A Deep Network for Sets

56

  • Only skeleton points contributes to the classification score
  • Caused by the “max” operator
  • Builds a low-dimensional space!
slide-57
SLIDE 57

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet can be Adversarially Attacked

57

slide-58
SLIDE 58

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet can be Adversarially Attacked

58

slide-59
SLIDE 59

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet can be Adversarially Attacked

59

slide-60
SLIDE 60

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet can be Adversarially Attacked

60

Only salient points are moved!

slide-61
SLIDE 61

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet can be Adversarially Attacked

61

slide-62
SLIDE 62

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

PointNet can be Adversarially Attacked

62

slide-63
SLIDE 63

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Evaluation

63

On 16 hand-picked object categories that humans can classify with 100% accuracy

Attack Method No Defense None 1.0 Fast Gradient L2 0.602 Iter Gradient L2 0.258 Iter Gradient L2 (clip norm) 0.548 Normalized Iter Gradient L2 0.355

<latexit sha1_base64="GaTdEvVOmhtq0Asr4Vr9iOxTQuY=">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</latexit>
slide-64
SLIDE 64

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Defense by Adversarial Training (FGSM)

  • Can be useful, but still lacks attack agnostic

64

Attack Method No Defense Adversarial Training None 1.0 0.995 Fast Gradient L2 0.602 0.927 Iter Gradient L2 0.258 0.629 Iter Gradient L2 (clip norm) 0.548 0.674 Normalized Iter Gradient L2 0.355 0.409

<latexit sha1_base64="GaTdEvVOmhtq0Asr4Vr9iOxTQuY=">AEIHicjZPditNAFMezqR9r/erqpTeDu8p6U5K03bYgsouyKmhdZbtdaEqZTE7aYSeTMDNZrDFv4Ct47XgQ3jhSJ6py/gazhpi9imgcC/znN85M5l4MaNSWdaPNbN05uy58+sXyhcvXb5ytbJx7UhGiSDQJRGLxLGHJTDKoauoYnAcC8Chx6DndzP13unICSN+KGaxDAI8YjTgBKstDXcMHeQ68GI8lRhL2FYZCl5TXRkZbQY7jvsezuKYXJCXoKahz56DbqROgBMAl6Jc9P2+NBcUMHQpMOeUjb+AMDrN5bNEMaozXPf/mnUirF21dIQV8FL5QWpVW23G5k2tGjWURG1j6VCDwX2KXCFtp4Mna1p9o7lzKqc5iKuUZ/hWu1WkfZYgSjQrKrTaM2gTnsB1q1shUzraJsE0ZjxCMR3smJjfqcqDe1QGzbWRHY0WY0Vfg/2vCWqMx5dWtpQmt2qoJix/ABe7/uSTlYWXTqlrTQEVhz8Xmbu/Xh3v7b94fDCvfXT8iSaiHIgxL2betWA1SLBQlDLKym0iI9VXCI+hryXEIcpBOL3iGbmnHR0Ek9KM3NX/rkhxKOUk9HRmiNVYLq/l5q1fqKC1iClPE4UcDJrFCQMqQjlfwvyqQCi2EQLTATVsyIyxgITfcgyPwR7ectFceRU7VrVea5P464xi3XjhnHT2DZso2nsGo+MA6NrEPOt+dH8bH4pvSt9Kn0tfZulmvzmuvGQpR+/gY9LCPy</latexit>
slide-65
SLIDE 65

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Defense by Transformation

  • An seemingly naive solution: “outlier removal”
  • Outlier: high mean Euclidean distance of each point to its k-nearest

neighbors (k=10 in experiments)

  • Outliers (over 1 standard deviation) are discarded

65

slide-66
SLIDE 66

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Surprisingly, a Simple yet Good Defender

66

Attack Method No Defense Adversarial Training Removing Outliers None 1.0 0.995 0.974 Fast Gradient L2 0.602 0.927 0.954 Iter Gradient L2 0.258 0.629 0.838 Iter Gradient L2 (clip norm) 0.548 0.674 0.891 Normalized Iter Gradient L2 0.355 0.409 0.803

<latexit sha1_base64="GaTdEvVOmhtq0Asr4Vr9iOxTQuY=">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</latexit>
slide-67
SLIDE 67

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Why?

67

  • Because PointNet only relies on a small set of skeleton points!
  • Removing outliers projects attacked shapes to the low-dim space of

skeletons

slide-68
SLIDE 68

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Outline

  • Background and Motivation
  • Project-based Defense Mechanism
  • For 2D Image Classification
  • For 3D Shape Classification
  • Summary

68

slide-69
SLIDE 69

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

69

  • Build a piece-wise linear image

space for natural images

  • Projection by convolutional

sparse coding

slide-70
SLIDE 70

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

70

  • Build a piece-wise linear image

space for natural images

  • Projection by convolutional

sparse coding

  • Build a low-dimension shape

space by PointNet

  • Projection by outlier removal
slide-71
SLIDE 71

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

71

Conclusion and Future Work

  • The projection methods in this talk are both very simple, yet they

achieve SOTA performance on attack agnostic defense

  • The projection method itself has to be attack agnostic, thus we choose

not to use networks for this projection step

  • Combining projection and adversarial learning may give better results
slide-72
SLIDE 72

Attack-Agnostic Defense for 2D and 3D Recognition Hao Su UC San Diego

Acknowledgement

72

Bo Sun to be a Ph.D. at UT Austin Daniel Liu Torrey Pines High School Tiange Luo Peking University Ronald Yu UCSD Fangchen Liu UCSD Nian-hsuan Tsai National Tsinghua University

Bo Li, Assistant Professor at UIUC