SlideShare a Scribd company logo
U N I V E R S A L
A D V E R S A R I A L
2 0 1 8 S N U V L S E M I N A R
H Y U N W O O K I M
P E R T U R B A T I O N
C O N T E N T S
1. Quick Intro to Adversarial Attacks
- Deep fool: A simple and accurate method
to fool deep neural networks
- Explaining & Harnessing Adversarial Examples
2. Universal Adversarial Perturbation
Attacks ?
Through the
human eye
Anderson & Winawer, 2005
iPodBoat Perturbation
Through the
machine’s eye
Adversarial
Example or Attack
Intriguing Properties of Neural Networks
C. Szegedy et al. ICLR, 2014.
Intriguing Properties of Neural Networks
C. Szegedy et al. ICLR, 2014.
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow et al. ICLR, 2015.
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow et al. ICLR, 2015.
Fast Gradient Sign Method [FGSM]
!" = " + %
&
Fast Gradient Sign Method [FGSM]
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow et al. ICLR, 2015.
Perturbation
Gradient of the
cost function
Fast Gradient Sign Method [FGSM]
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow et al. ICLR, 2015.
RAW Images ATTACKED Images
With Maxout Network
Misclassification Rate
- MNIST : 89.4%
Fast Gradient Sign Method [FGSM]
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow et al. ICLR, 2015.
RAW Images ATTACKED Images
With Conv Maxout Network
Misclassification Rate
- CIFAR-10 : 87.2%
Fast Gradient Sign Method [FGSM]
Explaining and Harnessing Adversarial Examples
I.J. Goodfellow et al. ICLR, 2015.
: Intensity of the Attack
Various methods of attacks
Ian Goodfellow
https://github.com/tensorflow/cleverhans
Python library for
Adversarial attacks
“They say that the best weapon
is the one you never have to fire.
I respectfully disagree.
I prefer the weapon
you only have to fire ONCE.”
-Tony Stark-
Universal
Adversarial
Perturbations
S.M. Moosavi-Dezfooli et al.
CVPR, 2017.
Universal Adversarial Perturbation
How to make one
• ! ∶ #$%&'$()&$*+ *, $-./0% $+ ℝ2
• 34 ∶ . 56.%%$,$5.&$*+ ,)+5&$*+ &ℎ.& *)&8)&% .+ 9:;<=>;9? @>A9@ 34 B
,*' 0.5ℎ $-./0 C ∈ ℝ2
E0 %00F . G05&*' H %)5ℎ &ℎ.&
How to make one:
constraints for the
!" #""$ % &"'()* + #,'ℎ (ℎ%(
+
2. Has to be small enough
1. Satisfies the fooling rate
∆"#
∆"$
%
How to make one:
the algorithm
2. Has to be small enough
1. Satisfies the fooling rate
Projection on the ℓ" ball of radius #
From another paper by the author
Universal Adversarial Perturbation
Take use of the tangent plane
Deep fool:
S.M. Moosavi-Dezfooli et al.
CVPR, 2016.
Take use of the tangent plane
Deep fool:
S.M. Moosavi-Dezfooli et al.
CVPR, 2016.
Take use of the tangent plane
Perturbation
Deep fool:
S.M. Moosavi-Dezfooli et al.
CVPR, 2016.
Deep fool: Take use of the tangent plane
2. Has to be small enough
1. Satisfies the fooling rate
The one perturbation that
messes up with all the classes
The Universal Perturbations
for each Network
93% 94%
79%
78%
78% 84%
Doubly-Universal on ImageNet Dataset
Cross-model Universality
Cross-model Universality
Intriguing Properties of Neural Networks
C. Szegedy et al. ICLR, 2014.
Doubly-Universal on ImageNet Dataset
Cross-model Universality
Need many images for crafting ?
500 is all you need!
How about fine tuning ?
Fine tuning on
the set of perturbations
94%76%
80%80%…
The real fun part
1. The existence of
dominant labels
Been overlooked
Intriguing Properties of Neural Networks
C. Szegedy et al. ICLR, 2014.
The whole picture
African Grey
Macaw
Some examples
2. Comparison with
other perturbations
3. Captures the local geometry
Geometric properties of
Adversarial Perturbations
1. ∥ "($) ∥& measures the Euclidean distance
from x to the closest point on the decision boundary
2. The vector "($) is orthogonal to the
decision boundary of the classifier
…....
n universal perturbations
(normal vectors)
n random vectors
"# "$ ….... "%
3. Captures the local geometry
N =
Difference in
Singular Value decay
Perform SVD of the matrix N
The existence of large correlations and
redundancies in the decision boundary
A subspace of low dimension d’
that contains most normal vectors to the
decision boundary of deep networks
Sample random vectors
from this subspace S
Spanned by the first 100 singular vectors
10%
38%
vs
There exists
a low-dimensional subspace
that captures the correlations
among different regions of the
decision boundary
Generalization of
Universal perturbations
The Universal Adversarial Perturbation
A silver bullet1 single vector
Image-agnostic
Network-agnostic
I L L U S I O N S
Adversarial Attacks
Thank you
Hyunwoo Kim

More Related Content

PPTX
Face recognition using neural network
PPTX
Object recognition of CIFAR - 10
PPTX
20211019 When does label smoothing help_shared ver
PPTX
Hough Transform By Md.Nazmul Islam
PDF
"Getting More from Your Datasets: Data Augmentation, Annotation and Generativ...
PDF
Lecture 4 Decision Trees (2): Entropy, Information Gain, Gain Ratio
PDF
Linear regression
PPTX
Prolog (present)
Face recognition using neural network
Object recognition of CIFAR - 10
20211019 When does label smoothing help_shared ver
Hough Transform By Md.Nazmul Islam
"Getting More from Your Datasets: Data Augmentation, Annotation and Generativ...
Lecture 4 Decision Trees (2): Entropy, Information Gain, Gain Ratio
Linear regression
Prolog (present)

What's hot (20)

PPTX
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
PPTX
U-Netpresentation.pptx
PDF
Machine Learning
PDF
Mobilenetv1 v2 slide
PDF
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
PPTX
Machine Learning and its Applications
PDF
A beginner's guide to Style Transfer and recent trends
PPTX
Data Mining: clustering and analysis
PPTX
Object detection presentation
PPTX
Detection and recognition of face using neural network
PPTX
Convolutional Neural Network and Its Applications
PPTX
Machine Learning
PPTX
Computer Vision - Artificial Intelligence
PPTX
Machine Learning Contents.pptx
PPTX
Digit recognition
PPTX
Emotion Based Music Player.pptx
PPTX
Random forest algorithm
PPT
Liang barsky Line Clipping Algorithm
PDF
Machine Learning and Data Mining: 04 Association Rule Mining
PDF
“An Introduction to Data Augmentation Techniques in ML Frameworks,” a Present...
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...
U-Netpresentation.pptx
Machine Learning
Mobilenetv1 v2 slide
Design principle of pattern recognition system and STATISTICAL PATTERN RECOGN...
Machine Learning and its Applications
A beginner's guide to Style Transfer and recent trends
Data Mining: clustering and analysis
Object detection presentation
Detection and recognition of face using neural network
Convolutional Neural Network and Its Applications
Machine Learning
Computer Vision - Artificial Intelligence
Machine Learning Contents.pptx
Digit recognition
Emotion Based Music Player.pptx
Random forest algorithm
Liang barsky Line Clipping Algorithm
Machine Learning and Data Mining: 04 Association Rule Mining
“An Introduction to Data Augmentation Techniques in ML Frameworks,” a Present...
Ad

Similar to Universal Adversarial Perturbation (20)

PPTX
adversarial robustness lecture
PDF
Paper Explained: One Pixel Attack for Fooling Deep Neural Networks
PDF
Adversarial examples in deep learning (Gregory Chatel)
PDF
Generational Adversarial Neural Networks - Essential Reference
PDF
Research of adversarial example on a deep neural network
PDF
[SOTIF US Conference] Introduction to Safe ML
PDF
Immunizing Image Classifiers Against Localized Adversary Attacks
PDF
Immunizing Image Classifiers Against Localized Adversary Attacks
PDF
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
PDF
Detecting adversarials examples attacks to deep neural networks
PDF
Robustness in deep learning
PDF
DEF CON 24 - Clarence Chio - machine duping 101
PDF
Survey of Adversarial Attacks in Deep Learning Models
PDF
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
PDF
DESSERTATION 4 SEM cybersecurity ensemble approach
PPTX
Black-Box attacks against Neural Networks - technical project presentation
PDF
Adversarial ML - Part 2.pdf
PDF
Capstone Design(2) 중간 발표
PPTX
Deceiving Autonomous Cars with Toxic Signs
PDF
Deep Learning Basics (lecture notes).pdf
adversarial robustness lecture
Paper Explained: One Pixel Attack for Fooling Deep Neural Networks
Adversarial examples in deep learning (Gregory Chatel)
Generational Adversarial Neural Networks - Essential Reference
Research of adversarial example on a deep neural network
[SOTIF US Conference] Introduction to Safe ML
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
Detecting adversarials examples attacks to deep neural networks
Robustness in deep learning
DEF CON 24 - Clarence Chio - machine duping 101
Survey of Adversarial Attacks in Deep Learning Models
BOOSTING ADVERSARIAL ATTACKS WITH MOMENTUM - Tianyu Pang and Chao Du, THU - D...
DESSERTATION 4 SEM cybersecurity ensemble approach
Black-Box attacks against Neural Networks - technical project presentation
Adversarial ML - Part 2.pdf
Capstone Design(2) 중간 발표
Deceiving Autonomous Cars with Toxic Signs
Deep Learning Basics (lecture notes).pdf
Ad

More from Hyunwoo Kim (15)

PDF
서울대학교 IAB 강의 Pytorch(파이토치) CNN 실습 수업
PDF
Curiosity-Bottleneck: Exploration by Distilling Task-Specific Novelty
PDF
Abstractive Summarization of Reddit Posts with Multi-level Memory Networks
PDF
Genetic Algorithm Project 2
PDF
Sentiment Analysis Intro
PDF
Two VWM representations simultaneously control attention
PDF
Capstone Design(2) 최종 발표
PDF
Neural Networks Basics with PyTorch
PDF
Capstone Design(2) 연구제안 발표
PDF
Capstone Design(1) 최종 발표
PDF
Capstone Design(1) 중간 발표
PDF
Capstone Design(1) 연구제안 발표
PDF
Neural Network Intro [인공신경망 설명]
PDF
Random Forest Intro [랜덤포레스트 설명]
PDF
Decision Tree Intro [의사결정나무]
서울대학교 IAB 강의 Pytorch(파이토치) CNN 실습 수업
Curiosity-Bottleneck: Exploration by Distilling Task-Specific Novelty
Abstractive Summarization of Reddit Posts with Multi-level Memory Networks
Genetic Algorithm Project 2
Sentiment Analysis Intro
Two VWM representations simultaneously control attention
Capstone Design(2) 최종 발표
Neural Networks Basics with PyTorch
Capstone Design(2) 연구제안 발표
Capstone Design(1) 최종 발표
Capstone Design(1) 중간 발표
Capstone Design(1) 연구제안 발표
Neural Network Intro [인공신경망 설명]
Random Forest Intro [랜덤포레스트 설명]
Decision Tree Intro [의사결정나무]

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
A Presentation on Artificial Intelligence
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A comparative analysis of optical character recognition models for extracting...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Network Security Unit 5.pdf for BCA BBA.
cloud_computing_Infrastucture_as_cloud_p
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
A comparative study of natural language inference in Swahili using monolingua...
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Heart disease approach using modified random forest and particle swarm optimi...
Tartificialntelligence_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A Presentation on Artificial Intelligence
TLE Review Electricity (Electricity).pptx
OMC Textile Division Presentation 2021.pptx
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

Universal Adversarial Perturbation