Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sun, Feng | en_US |
dc.contributor.author | Zhang, Zhenjiang | en_US |
dc.contributor.author | Kao, Yi-Chih | en_US |
dc.contributor.author | Li, Tianzhou | en_US |
dc.contributor.author | Shen, Bo | en_US |
dc.date.accessioned | 2019-10-05T00:08:44Z | - |
dc.date.available | 2019-10-05T00:08:44Z | - |
dc.date.issued | 2019-01-01 | en_US |
dc.identifier.issn | 1607-9264 | en_US |
dc.identifier.uri | http://dx.doi.org/10.3966/160792642019072004028 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/152843 | - |
dc.description.abstract | Nowadays, with the development of artificial intelligence, deep learning has attracted more and more attention. Whereas deep neural network has made incredible progress in many domains including Computer Vision, Nature Language Processing, etc, recent studies show that they are vulnerable to the adversarial attacks which takes legitimate images with undetected perturbation as input and can mislead the model to predict incorrect outputs. We consider that the key point of the adversarial attack is the undetected perturbation added to the input. It will be of great significance to eliminate the effect of the added noise. Thus, we design a new, efficient model based on residual image which can detect this potential adversarial attack. We design a method to get the residual image which can capture these possible perturbations. Based on the residual image we got, the detection mechanism can help us detect whether it is an adversarial image or not. A serial of experiments has also been carried out. Subsequent experiments prove that the new detection method can detect the adversarial attack with high effectivity. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Adversarial attack | en_US |
dc.subject | Detection mechanism | en_US |
dc.subject | Residual image | en_US |
dc.title | A New Method to Detect the Adversarial Attack Based on the Residual Image | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.3966/160792642019072004028 | en_US |
dc.identifier.journal | JOURNAL OF INTERNET TECHNOLOGY | en_US |
dc.citation.volume | 20 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 1297 | en_US |
dc.citation.epage | 1304 | en_US |
dc.contributor.department | 資訊技術服務中心 | zh_TW |
dc.contributor.department | Information Technology Services Center | en_US |
dc.identifier.wosnumber | WOS:000483464100029 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Articles |