SlideShare a Scribd company logo
Towards Deep Learning Models Resistant to Adversarial Attacks.
1. Introduction
Introduction
Introduction
In particular, resistance to adversarially chosen inputs is becoming a crucial design goal
Introduction
Introduction
How can we train deep neural networks that
are robust to adversarial inputs?
2. An Optimization View on Adversarial Robustness
An Optimization View on Adversarial Robustness
An Optimization View on Adversarial Robustness
Adversarial attack problem
Inner maximization problem
Outer minimization problem
Min max game
Saddle point problem
An Optimization View on Adversarial Robustness
PGD (projected gradient descent )
FGSM (Fast Gradient Sign Method)
Inner maximization problem
3. Towards Universally Robust Networks
Towards Universally Robust Networks
Towards Universally Robust Networks
Towards Universally Robust Networks
Blue : loss on a standard network
Red : adversarially trained model
4. Network Capacity and Adversarial Robustness
Network Capacity and Adversarial Robustness
Network Capacity and Adversarial Robustness
Experiments
5. Experiments
Experiments
Experiments
Towards Deep Learning Models Resistant to Adversarial Attacks.
references
Towards Deep Learning Models Resistant to Adversarial Attacks, Aleksander
Madry, Aleksandar Makelov; ICLR, 2018,
Explaining and Harnessing Adversarial Examples, Ian J. Goodfellow, Jonathon
Shlens, Christian Szegedy, ICLR, 2015,

More Related Content

PDF
[DL輪読会]自動運転技術の課題に役立つかもしれない論文3本
PDF
東北大学講義資料 実世界における自然言語処理 - すべての人にロボットを - 坪井祐太 
PDF
企業の中の経済学
PDF
金融×AIで解くべき問題は何か?
PDF
年間1,000万件のアラートを自動処理してみた
 
PDF
深層強化学習でマルチエージェント学習(前篇)
PPTX
[DL輪読会] マルチエージェント強化学習と心の理論
PPTX
Active Learning と Bayesian Neural Network
[DL輪読会]自動運転技術の課題に役立つかもしれない論文3本
東北大学講義資料 実世界における自然言語処理 - すべての人にロボットを - 坪井祐太 
企業の中の経済学
金融×AIで解くべき問題は何か?
年間1,000万件のアラートを自動処理してみた
 
深層強化学習でマルチエージェント学習(前篇)
[DL輪読会] マルチエージェント強化学習と心の理論
Active Learning と Bayesian Neural Network

What's hot (20)

PDF
データに内在する構造をみるための埋め込み手法
PPTX
210927 PMBOK第7版の概要
PDF
アジャイルにモデリングは必要か
PDF
Non-autoregressive text generation
PPTX
ビッグデータ処理データベースの全体像と使い分け - 2017年 Version -
PDF
金融ISAC アニュアルカンファレンス 2020:Intelligence Driven Securityの「ことはじめ」
PDF
[DL輪読会]Estimating Predictive Uncertainty via Prior Networks
PPTX
強化学習 と ゲーム理論 (MARL)
PPT
社会人博士入試面接スライド(ヘテロ加速器環境でのデータストリームグラフ処理フレームワーク)
PPTX
バックキャスティングによる戦略の作り方~実現したい未来から考える~
PDF
ドメイン駆動設計のための Spring の上手な使い方
PDF
[DL輪読会]DISTRIBUTIONAL POLICY GRADIENTS
PDF
(修正)機械学習デザインパターン(ML Design Patterns)の解説
PDF
大規模言語モデルとChatGPT
PDF
ドメイン駆動設計の捉え方 20150718
PDF
日経BPリーン式創業塾 #leanstartup #リーンスタートアップ
PDF
【DL輪読会】Perceiver io a general architecture for structured inputs & outputs
PPTX
研華 智聯工廠與智能設備雙引擎|實踐智慧製造
PDF
差分プライバシーによる時系列データの扱い方
PPTX
ReactでuseEffect()を減らしたい話
データに内在する構造をみるための埋め込み手法
210927 PMBOK第7版の概要
アジャイルにモデリングは必要か
Non-autoregressive text generation
ビッグデータ処理データベースの全体像と使い分け - 2017年 Version -
金融ISAC アニュアルカンファレンス 2020:Intelligence Driven Securityの「ことはじめ」
[DL輪読会]Estimating Predictive Uncertainty via Prior Networks
強化学習 と ゲーム理論 (MARL)
社会人博士入試面接スライド(ヘテロ加速器環境でのデータストリームグラフ処理フレームワーク)
バックキャスティングによる戦略の作り方~実現したい未来から考える~
ドメイン駆動設計のための Spring の上手な使い方
[DL輪読会]DISTRIBUTIONAL POLICY GRADIENTS
(修正)機械学習デザインパターン(ML Design Patterns)の解説
大規模言語モデルとChatGPT
ドメイン駆動設計の捉え方 20150718
日経BPリーン式創業塾 #leanstartup #リーンスタートアップ
【DL輪読会】Perceiver io a general architecture for structured inputs & outputs
研華 智聯工廠與智能設備雙引擎|實踐智慧製造
差分プライバシーによる時系列データの扱い方
ReactでuseEffect()を減らしたい話
Ad

Similar to Towards Deep Learning Models Resistant to Adversarial Attacks. (20)

PDF
Survey of Adversarial Attacks in Deep Learning Models
PDF
Adversarial ml
PPTX
Adversarial Training is all you Need.pptx
PDF
Adversarial-robust steganalysis system leveraging adversarial training and Ef...
PDF
Robustness of compressed CNNs
PDF
Fortifying Cyber Defence The Evolution of Deep Learning Architectures.pdf
PDF
Adversarial Attacks and Defenses in Deep Learning.pdf
PDF
Fortifying Cyber Defence: The Evolution of Deep Learning Architectures
PPTX
ICDCC_40shugajkshdgjkadkjhgjkjhgjkhgjkhg
PPTX
Neural nets
PDF
Risk Assessment for Identifying Intrusion in Manet
PPTX
Group 10 - DNN Presentation for UOM.pptx
PDF
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
PDF
cyber security DOS attack using NS2 ppt content
PPTX
adversarial robustness through local linearization
PDF
Deep Comparison Analysis : Statistical Methods and Deep Learning for Network ...
PPTX
Network-Intrusion-Detection-Using-Machine-Learning-1.pptx
PDF
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
PPTX
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Survey of Adversarial Attacks in Deep Learning Models
Adversarial ml
Adversarial Training is all you Need.pptx
Adversarial-robust steganalysis system leveraging adversarial training and Ef...
Robustness of compressed CNNs
Fortifying Cyber Defence The Evolution of Deep Learning Architectures.pdf
Adversarial Attacks and Defenses in Deep Learning.pdf
Fortifying Cyber Defence: The Evolution of Deep Learning Architectures
ICDCC_40shugajkshdgjkadkjhgjkjhgjkhgjkhg
Neural nets
Risk Assessment for Identifying Intrusion in Manet
Group 10 - DNN Presentation for UOM.pptx
Hardware Trojan Attacks on Neural Networks - Joseph Clements - DEF CON 26 CAA...
cyber security DOS attack using NS2 ppt content
adversarial robustness through local linearization
Deep Comparison Analysis : Statistical Methods and Deep Learning for Network ...
Network-Intrusion-Detection-Using-Machine-Learning-1.pptx
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Ad

More from SEMINARGROOT (20)

PDF
Metric based meta_learning
PDF
Sampling method : MCMC
PDF
Demystifying Neural Style Transfer
PDF
The ways of node embedding
PDF
Graph Convolutional Network
PDF
Denoising With Frequency Domain
PDF
Bayesian Statistics
PDF
Coding Test Review 3
PDF
Time Series Analysis - ARMA
PDF
Differential Geometry for Machine Learning
PDF
Generative models : VAE and GAN
PDF
Effective Python
PDF
Understanding Blackbox Prediction via Influence Functions
PDF
Attention Is All You Need
PDF
Attention
PDF
WWW 2020 XAI Tutorial Review
PDF
Coding test review 2
PDF
Locality sensitive hashing
PDF
Coding Test Review1
PDF
Strong convexity on gradient descent and newton's method
Metric based meta_learning
Sampling method : MCMC
Demystifying Neural Style Transfer
The ways of node embedding
Graph Convolutional Network
Denoising With Frequency Domain
Bayesian Statistics
Coding Test Review 3
Time Series Analysis - ARMA
Differential Geometry for Machine Learning
Generative models : VAE and GAN
Effective Python
Understanding Blackbox Prediction via Influence Functions
Attention Is All You Need
Attention
WWW 2020 XAI Tutorial Review
Coding test review 2
Locality sensitive hashing
Coding Test Review1
Strong convexity on gradient descent and newton's method

Recently uploaded (20)

PDF
Lecture1 pattern recognition............
PDF
Business Analytics and business intelligence.pdf
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPT
Quality review (1)_presentation of this 21
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
annual-report-2024-2025 original latest.
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Computer network topology notes for revision
PPTX
climate analysis of Dhaka ,Banglades.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Lecture1 pattern recognition............
Business Analytics and business intelligence.pdf
Introduction to Knowledge Engineering Part 1
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
ISS -ESG Data flows What is ESG and HowHow
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Quality review (1)_presentation of this 21
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Fluorescence-microscope_Botany_detailed content
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
annual-report-2024-2025 original latest.
Introduction-to-Cloud-ComputingFinal.pptx
Business Acumen Training GuidePresentation.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Clinical guidelines as a resource for EBP(1).pdf
Database Infoormation System (DBIS).pptx
Computer network topology notes for revision
climate analysis of Dhaka ,Banglades.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf

Towards Deep Learning Models Resistant to Adversarial Attacks.