scholarly journals Real-Time Adversarial Attack Detection with Deep Image Prior Initialized as a High-Level Representation Based Blurring Network

Electronics ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 52
Author(s):  
Richard Evan Sutanto ◽  
Sukho Lee

Several recent studies have shown that artificial intelligence (AI) systems can malfunction due to intentionally manipulated data coming through normal channels. Such kinds of manipulated data are called adversarial examples. Adversarial examples can pose a major threat to an AI-led society when an attacker uses them as means to attack an AI system, which is called an adversarial attack. Therefore, major IT companies such as Google are now studying ways to build AI systems which are robust against adversarial attacks by developing effective defense methods. However, one of the reasons why it is difficult to establish an effective defense system is due to the fact that it is difficult to know in advance what kind of adversarial attack method the opponent is using. Therefore, in this paper, we propose a method to detect the adversarial noise without knowledge of the kind of adversarial noise used by the attacker. For this end, we propose a blurring network that is trained only with normal images and also use it as an initial condition of the Deep Image Prior (DIP) network. This is in contrast to other neural network based detection methods, which require the use of many adversarial noisy images for the training of the neural network. Experimental results indicate the validity of the proposed method.

Author(s):  
Chao Li ◽  
Baolin Liu ◽  
Jianguo Wei

Using a convolutional neural network to build visual encoding and decoding models of the human brain is a good starting point for the study on relationship between deep learning and human visual cognitive mechanism. However, related studies have not fully considered their differences. In this paper, we assume that only a portion of neural network features is directly related to human brain signals, which we call shared features. In the encoding process, we extract shared features from the lower and higher layers of the neural network, and then build a non-negative sparse map to predict brain activities. In the decoding process, we use back-propagation to reconstruct visual stimuli, and use dictionary learning and a deep image prior to improve the robustness and accuracy of the algorithm. Experiments on a public fMRI dataset confirm the rationality of the encoding models, and comparing with a recently proposed method, our reconstruction results obtain significantly higher accuracy.


Mining ◽  
2021 ◽  
Vol 1 (3) ◽  
pp. 279-296
Author(s):  
Marc Elmouttie ◽  
Jane Hodgkinson ◽  
Peter Dean

Geotechnical complexity in mining often leads to geotechnical uncertainty which impacts both safety and productivity. However, as mining progresses, particularly for strip mining operations, a body of knowledge is acquired which reduces this uncertainty and can potentially be used by mining engineers to improve the prediction of future mining conditions. In this paper, we describe a new method to support this approach based on modelling and neural networks. A high-level causal model of the mining operations based on historical data for a number of parameters was constructed which accounted for parameter interactions, including hydrogeological conditions, weather, and prior operations. An artificial neural network was then trained on this historical data, including production data. The network can then be used to predict future production based on presently observed mining conditions as mining proceeds and compared with the model predictions. Agreement with the predictions indicates confidence that the neural network predictions are properly supported by the newly available data. The efficacy of this approach is demonstrated using semi-synthetic data based on an actual mine.


2020 ◽  
Vol 73 (7) ◽  
pp. 1499-1504
Author(s):  
Oleksandr A. Udod ◽  
Hanna S. Voronina ◽  
Olena Yu. Ivchenkova

The aim: of the work was to develop and apply in the clinical trial a software product for the dental caries prediction based on neural network programming. Materials and methods: Dental examination of 73 persons aged 6-7, 12-15 and 35-44 years was carried out. The data obtained during the survey were used as input for the construction and training of the neural network. The output index was determined by the increase in the intensity of caries, taking into account the number of cavities. To build a neural network, a high-level Python programming language with the NumPay extension was used. Results: The intensity of carious dental lesions was the highest in 35-44 years old patients – 6.69 ± 0.38, in 6-7 years old children and 12-15 years old children it was 3.85 ± 0.27 and 2.15 ± 0.24, respectively (p <0.05). After constructing and training the neural network, 61 true and 12 false predictions were obtained based on these indices, the accuracy of predicting the occurrence of caries was 83.56%. Based on these results, a graphical user interface for the “CariesPro” software application was created. Conclusions: The resulting neural network and the software product based on it permit to predict the development of dental caries in persons of all ages with a probability of 83.56%.


2017 ◽  
Vol 16 (05) ◽  
pp. 1730001 ◽  
Author(s):  
Alex Brown ◽  
E. Pradhan

In this paper, the use of the neural network (NN) method with exponential neurons for directly fitting ab initio data to generate potential energy surfaces (PESs) in sum-of-product form will be discussed. The utility of the approach will be highlighted using fits of CS2, HFCO, and HONO ground state PESs based upon high-level ab initio data. Using a generic interface between the neural network PES fitting, which is performed in MATLAB, and the Heidelberg multi-configuration time-dependent Hartree (MCTDH) software package, the PESs have been tested via comparison of vibrational energies to experimental measurements. The review demonstrates the potential of the PES fitting method, combined with MCTDH, to tackle high-dimensional quantum dynamics problems.


2014 ◽  
Vol 602-605 ◽  
pp. 2044-2047
Author(s):  
Miao Yan ◽  
Zhi Bao Liu

The large-scale software is consisted of the components which are quite different. The detection accuracy of the traditional faults detection methods for the large-scale component software is not satisfactory. This paper proposes a large-scale software faults detection methods based on improved neural network combining the features of the large-scale software by computing the stable probability and building the neural network faults detection models. The proposed method can analyze the serial faults of the large-scale software to determine the positions of the faults. The experiment and simulation results show that the improved method for large-scale software fault detection can greatly improve the accuracy.


2017 ◽  
Vol 19 (30) ◽  
pp. 19873-19880 ◽  
Author(s):  
Shufen Wang ◽  
Jiuchuang Yuan ◽  
Huixing Li ◽  
Maodu Chen

A new potential energy surface of the NaH2 system is obtained using the neural network method based on high-level energies.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2687
Author(s):  
Eun-Hun Lee ◽  
Hyeoncheol Kim

The significant advantage of deep neural networks is that the upper layer can capture the high-level features of data based on the information acquired from the lower layer by stacking layers deeply. Since it is challenging to interpret what knowledge the neural network has learned, various studies for explaining neural networks have emerged to overcome this problem. However, these studies generate the local explanation of a single instance rather than providing a generalized global interpretation of the neural network model itself. To overcome such drawbacks of the previous approaches, we propose the global interpretation method for the deep neural network through features of the model. We first analyzed the relationship between the input and hidden layers to represent the high-level features of the model, then interpreted the decision-making process of neural networks through high-level features. In addition, we applied network pruning techniques to make concise explanations and analyzed the effect of layer complexity on interpretability. We present experiments on the proposed approach using three different datasets and show that our approach could generate global explanations on deep neural network models with high accuracy and fidelity.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Zhaojie Wang ◽  
Qingzhe Lv ◽  
Zhaobo Lu ◽  
Yilei Wang ◽  
Shengjie Yue

Incentive mechanism is the key to the success of the Bitcoin system as a permissionless blockchain. It encourages participants to contribute their computing resources to ensure the correctness and consistency of user transaction records. Selfish mining attacks, however, prove that Bitcoin’s incentive mechanism is not incentive-compatible, which is contrary to traditional views. Selfish mining attacks may cause the loss of mining power, especially those of honest participants, which brings great security challenges to the Bitcoin system. Although there are a series of studies against selfish mining behaviors, these works have certain limitations: either the existing protocol needs to be modified or the detection effect for attacks is not satisfactory. We propose the ForkDec, a high-accuracy system for selfish mining detection based on the fully connected neural network, for the purpose of effectively deterring selfish attackers. The neural network contains a total of 100 neurons (10 hidden layers and 10 neurons per layer), learned on a training set containing about 200,000 fork samples. The data set, used to train the model, is generated by a Bitcoin mining simulator that we preconstructed. We also applied ForkDec to the test set to evaluate the attack detection and achieved a detection accuracy of 99.03%. The evaluation experiment demonstrates that ForkDec has certain application value and excellent research prospects.


Author(s):  
Xingxing Wei ◽  
Siyuan Liang ◽  
Ning Chen ◽  
Xiaochun Cao

Identifying adversarial examples is beneficial for understanding deep networks and developing robust models. However, existing attacking methods for image object detection have two limitations: weak transferability---the generated adversarial examples often have a low success rate to attack other kinds of detection methods, and high computation cost---they need much time to deal with video data, where many frames need polluting. To address these issues, we present a generative method to obtain adversarial images and videos, thereby significantly reducing the processing time. To enhance transferability, we manipulate the feature maps extracted by a feature network, which usually constitutes the basis of object detectors. Our method is based on the Generative Adversarial Network (GAN) framework, where we combine a high-level class loss and a low-level feature loss to jointly train the adversarial example generator. Experimental results on PASCAL VOC and ImageNet VID datasets show that our method efficiently generates image and video adversarial examples, and more importantly, these adversarial examples have better transferability, therefore being able to simultaneously attack two kinds of  representative object detection models: proposal based models like Faster-RCNN and regression based models like SSD.


Sign in / Sign up

Export Citation Format

Share Document