用户名: 密码: 验证码:
基于粒子群优化的对抗样本生成算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Adversarial Example Generation Based on Particle Swarm Optimization
  • 作者:钱亚冠 ; 卢红波 ; 纪守领 ; 周武杰 ; 吴淑慧 ; 云本胜 ; 陶祥兴 ; 雷景生
  • 英文作者:QIAN Yaguan;LU Hongbo;JI Shouling;ZHOU Wujie;WU Shuhui;YUN Bensheng;TAO Xiangxing;LEI Jingsheng;School of Science/School of Big-data Science, Zhejiang University of Science and Technology;School of Computer Science, Zhejiang University;School of Electronic and Information Engineering, Zhejiang University of Science and Technology;
  • 关键词:机器学习 ; 支持向量机 ; 探测攻击 ; 显著性扰动 ; 对抗样本
  • 英文关键词:Machine learning;;Support Vector Machine(SVM);;Exploring attacks;;Salient perpetuation;;Adversarial example
  • 中文刊名:DZYX
  • 英文刊名:Journal of Electronics & Information Technology
  • 机构:浙江科技学院理学院/大数据学院;浙江大学计算机学院;浙江科技学院电子与信息工程学院;
  • 出版日期:2019-07-15
  • 出版单位:电子与信息学报
  • 年:2019
  • 期:v.41
  • 基金:浙江省自然科学基金(LY17F020011,LY18F020012);; 浙江省公益技术应用研究项目(LGG19F030001);; 国家自然科学基金(61772466,61672337,11771399)~~
  • 语种:中文;
  • 页:DZYX201907018
  • 页数:8
  • CN:07
  • ISSN:11-4494/TN
  • 分类号:138-145
摘要
随着机器学习被广泛的应用,其安全脆弱性问题也突显出来。该文提出一种基于粒子群优化(PSO)的对抗样本生成算法,揭示支持向量机(SVM)可能存在的安全隐患。主要采用的攻击策略是篡改测试样本,生成对抗样本,达到欺骗SVM分类器,使其性能失效的目的。为此,结合SVM在高维特征空间的线性可分的特点,采用PSO方法寻找攻击显著性特征,再利用均分方法逆映射回原始输入空间,构建对抗样本。该方法充分利用了特征空间上线性模型上易寻优的特点,同时又利用了原始输入空间篡改数据的可解释性优点,使原本难解的优化问题得到实现。该文对2个公开数据集进行实验,实验结果表明,该方法通过不超过7%的小扰动量生成的对抗样本均能使SVM分类器失效,由此证明了SVM存在明显的安全脆弱性。
        As machine learning is widely applied to various domains, its security vulnerability is also highlighted. A PSO(Particle Swarm Optimization) based adversarial example generation algorithm is proposed to reveal the potential security risks of Support Vector Machine(SVM). The adversarial examples, generated by slightly crafting the legitimate samples, can mislead SVM classifier to give wrong classification results. Using the linear separable property of SVM in high-dimensional feature space, PSO is used to find the salient features, and then the average method is used to map back to the original input space to construct the adversarial example. This method makes full use of the easily finding salient features of linear models in the feature space, and the interpretable advantages of the original input space. Experimental results show that the proposed method can fool SVM classifier by using the adversarial example generated by less than 7 % small perturbation, thus proving that SVM has obvious security vulnerability.
引文
[1]BARRENO M,NELSON B,SEARS R,et al.Can machine learning be secure?[C].Proceedings of 2006 ACMSymposium on Information,Computer and Communications Security,Taipei,China,2006:16-25.doi:10.1145/1128817.1128824.
    [2]LI Pan,ZHAO Wentao,LIU Qiang,et al.Security issues and their countermeasuring techniques of machine learning:A survey[J].Journal of Frontiers of Computer Science&Technology,2018,12(2):171-184.
    [3]SZEGEDY C,ZAREMBA W,SUTSKEVER I,et al.Intriguing properties of neural networks[EB/OL].http://arxiv.org/abs/1312.6199v4,2014.
    [4]PAPERNOT N,MCDANIEL P,JHA S,et al.The limitations of deep learning in adversarial settings[C].Proceedings of 2016 IEEE European Symposium on Security and Privacy,Saarbrucken,Germany,2016:372-387.doi:10.1109/EuroSP.2016.36.
    [5]PAPERNOT N,MCDANIEL P,GOODFELLOW I,et al.Practical black-box attacks against machine learning[EB/OL].http://arxiv.org/abs/1602.02697v4,2017.
    [6]AKHTAR N and MIAN A.Threat of adversarial attacks on deep learning in computer vision:A survey[J].IEEE Access,2018,6:14410-14430.doi:10.1109/ACCESS.2018.2807385.
    [7]CORTES C and VAPNIK V.Support-vector networks[J].Machine Learning,1995,20(3):273-297.doi:10.1007/BF00994018.
    [8]BIGGIO B,NELSON B,and LASKOV P.Support vector machines under adversarial label noise[C].Proceedings of the 3rd Asian Conference on Machine Learning,Taoyuan,China,2011,20:97-112.
    [9]BIGGIO B,NELSON B,and LASKOV P.Poisoning attacks against support vector machines[EB/OL].http://arxiv.org/abs/1206.6389v3,2013.
    [10]MEI Shike and ZHU Xiaojin.Using machine teaching to identify optimal training-set attacks on machine learners[C].Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence,Austin,USA,2015:2871-2877.
    [11]CHEN Zhipeng,TONDI B,LI Xiaolong,et al.A gradientbased pixel-domain attack against SVM detection of global image manipulations[C].Proceedings of 2017 IEEEWorkshop on Information Forensics and Security,Rennes,France,2017:1-6.doi:10.1109/WIFS.2017.8267668.
    [12]BIGGIO B,CORONA I,MAIORCA D,et al.Evasion attacks against machine learning at test time[EB/OL].http://arxiv.org/abs/1708.06131,2013.
    [13]GOLLAND P.Discriminative direction for kernel classifiers[C].Proceedings of the 14th International Conference on Neural Information Processing Systems:Natural and Synthetic,Vancouver,British Columbia,Canada,2001:745-752.
    [14]AMRAEE S,VAFAEI A,JAMSHIDI K,et al.Abnormal event detection in crowded scenes using one-class SVM[J].Signal,Image and Video Processing,2018,12(6):1115-1123.doi:10.1007/s11760-018-1267-z.
    [15]BENMAHAMED Y,TEGUAR M,and BOUBAKEUR A.Application of SVM and KNN to Duval pentagon 1 for transformer oil diagnosis[J].IEEE Transactions on Dielectrics and Electrical Insulation,2017,24(6):3443-3451.doi:10.1109/TDEI.2017.006841.
    [16]SCHNALL A and HECKMANN M.Feature-space SVMadaptation for speaker adapted word prominence detection[J].Computer Speech&Language,2019,53:198-216.doi:10.1016/j.csl.2018.06.001.
    [17]ZHAO Rui and MAO Kezhi.Semi-random projection for dimensionality reduction and extreme learning machine in high-dimensional space[J].IEEE Computational Intelligence Magazine,2015,10(3):30-41.doi:10.1109/MCI.2015.2437316.
    [18]EBERHART R and KENNEDY J.A new optimizer using particle swarm theory[C].Proceedings of the Sixth International Symposium on Micro Machine and Human Science,Nagoya,Japan,2002:39-43.doi:10.1109/MHS.1995.494215.
    [19]SHI Y and EBERHART R.A modified particle swarm optimizer[C].Proceeding of 1998 IEEE International Conference on Evolutionary Computation,World Congress on Computational Intelligence,Anchorage,USA,1998:69-73.doi:10.1109/ICEC.1998.699146.
    [20]LIN S W,YING K C,CHEN S C,et al.Particle swarm optimization for parameter determination and feature selection of support vector machines[J].Expert Systems with Applications,2008,35(4):1817-1824.doi:10.1016/j.eswa.2007.08.088.
    [21]LECUN Y,CORTES C,and BURGES C J C.The MNISTdatabase of handwritten digits[EB/OL].http://yann.lecun.com/exdb/mnist/,2010.
    [22]YALE.The Yale face database[OL].http://cvc.cs.yale.edu/cvc/projects/yalefaces/yalefaces.html,1997.
    [23]何光辉,唐远炎,房斌,等.图像分割方法在人脸识别中的应用[J].计算机工程与应用,2010,46(28):196-198.doi:10.3778/j.issn.1002-8331.2010.28.055.HE Guanghui,TANG Yuanyan,FANG Bin,et al.Image partition method in face recognition[J].Computer Engineering and Applications,2010,46(28):196-198.doi:10.3778/j.issn.1002-8331.2010.28.055.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700