Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Adversarial example generation method based on image flipping transform
Bo YANG, Hengwei ZHANG, Zheming LI, Kaiyong XU
Journal of Computer Applications    2022, 42 (8): 2319-2325.   DOI: 10.11772/j.issn.1001-9081.2021060993
Abstract572)   HTML54)    PDF (1609KB)(289)       Save

In the face of adversarial example attack, deep neural networks are vulnerable. These adversarial examples result in the misclassification of deep neural networks by adding human-imperceptible perturbations on the original images, which brings a security threat to deep neural networks. Therefore, before the deployment of deep neural networks, the adversarial attack is an important method to evaluate the robustness of models. However, under the black-box setting, the attack success rates of adversarial examples need to be improved, that is, the transferability of adversarial examples need to be increased. To address this issue, an adversarial example method based on image flipping transform, namely FT-MI-FGSM (Flipping Transformation Momentum Iterative Fast Gradient Sign Method), was proposed. Firstly, from the perspective of data augmentation, in each iteration of the adversarial example generation process, the original input image was flipped randomly. Then, the gradient of the transformed images was calculated. Finally, the adversarial examples were generated based on this gradient, so as to alleviate the overfitting in the process of adversarial example generation and to improve the transferability of adversarial examples. In addition, the method of attacking ensemble models was used to further enhance the transferability of adversarial examples. Extensive experiments on ImageNet dataset demonstrated the effectiveness of the proposed algorithm. Compared with I-FGSM (Iterative Fast Gradient Sign Method) and MI-FGSM (Momentum I-FGSM), the average black-box attack success rate of FT-MI-FGSM on the adversarially training networks is improved by 26.0 and 8.4 percentage points under the attacking ensemble model setting, respectively.

Table and Figures | Reference | Related Articles | Metrics
Memory combined feature classification method based on multiple BP neural networks
Jialiang DUAN, Guoming CAI, Kaiyong XU
Journal of Computer Applications    2022, 42 (1): 178-182.   DOI: 10.11772/j.issn.1001-9081.2021010199
Abstract288)   HTML9)    PDF (563KB)(46)       Save

The memory data will change after occurring the attack behaviors, and benchmark measurement used by the traditional integrity measurement system has the problems of low detection rate and lack of flexibility. Aiming at the above problems, a memory combined feature classification method based on multiple Back Propagation (BP) neural networks was proposed. Firstly, the feature value of the memory data was extracted by Measuring Object Extraction Algorithm (MOEA). Then, the model was trained by different BP neural networks. Finally, a BP neural network was used to collect the obtained data and calculate the safety status score of the operating system. Experimental results show that compared with the traditional integrity measurement system using benchmark measurement, the proposed method has much higher accuracy and universality, and the proposed method has a detection accuracy of 98.25%, which is higher than those of Convolutional Neural Network (CNN), K-Nearest Neighbor (KNN) algorithm and single BP neural network, verifying the proposed method can detect attack behaviors more accurately. The proposed method has the model training time about 1/3 of the traditional single BP neural network, and also has the model training speed improved compared with similar models.

Table and Figures | Reference | Related Articles | Metrics