SlideShare a Scribd company logo
1 of 80
Download to read offline
Robustness of Deep Neural Networks
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 1 of 80
Robustness of Deep Neural Networks
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 2 of 80
• Decision-boundary crossing
• Vulnerability of deep neural networks in different data
• Different attacks and penetration ways of ML & DL
approaches
• Attack Toolboxes
• Different defense strategies for DNN
• Tips to stay safe in DNN
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Outlines
3 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Data
https://www.slideshare.net/BrianKim244/dcgan-77452250
𝑑2
𝑑1
c
4 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Data
https://www.slideshare.net/BrianKim244/dcgan-77452250
c
𝑑1 × 𝑑2 × 𝑐
0.975 , 0.2, 0.0023, 0.5, ….. , 0.5156
𝑑2
𝑑1
5 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Data
6 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Data
https://www.slideshare.net/BrianKim244/dcgan-77452250
7 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Life of the points …
https://www.slideshare.net/khalooei/life-of-points-machine-learning-with-orange-flavor
https://ceit.aut.ac.ir/~khalooei/presentations/
https://www.slideshare.net/khalooei/life-of-points-machine-learning-with-orange-flavor
8 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Discriminative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
9 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Discriminative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
10 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Discriminative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
11 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Discriminative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
12 of 84
Generative Model
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Generative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
TrainingData
Training
Generated Data
Unseen new data
13 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Generative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
Distribution of the actual images
14 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Generative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
15 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Generative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
16 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Generative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
17 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review:: Generative Model
https://www.slideshare.net/BrianKim244/dcgan-77452250
Distribution of the actual images
18 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Decision boundary crossing
https://scikit-learn.org/stable/auto_examples/classification/plot_classifier_comparison.html
19 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Decision boundary crossing
http://www.cse.chalmers.se/~richajo/dit866/lectures/l3/Plotting%20decision%20boundaries.html
Decision Tree Perceptron
20 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Vulnerability of Deep Neural Networks
https://www.euclidean.com/deep-learning-and-value-investing
21 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
AI and the top innovation
https://www.usenix.org/sites/default/files/conference/protected-files/enigma17_slides_papernot.pdf
22 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
AI and the top innovation
23 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
AI and the top innovation
24 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Machine learning …
Adversarial Machine Learning,
Author(s): Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar
Publisher: Cambridge University Press, Year: 2019
25 of 84
Fooling Google's image-
recognition AI 1000x faster
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
On the line of recent researches …
`
December 20 '17
26 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
On the line of recent researches …
https://syncedreview.com/2019/04/24/now-you-see-me-now-you-dont-fooling-a-person-detector/
27 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
On the line of recent researches …
https://towardsdatascience.com/evasion-attacks-on-machine-learning-or-adversarial-examples-12f2283e06a1
28 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
An interesting usage :: Google verification!
29 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
On the line of recent researches …
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini, David Wagner
Deep Learning and Security Workshop, 2018. Best Paper
30 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
On the line of recent researches …
Generating Natural Language Adversarial Examples
Moustafa Alzantot, Yash Sharma, Ahmed Elgohary, Bo-Jhang Ho, Mani B. Srivastava, Kai-Wei Chang
Published in EMNLP 2018
DOI:10.18653/v1/d18-1316
31 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Delving into the problem …
32 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Motivation
33 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Motivation
Gradient-descent
34 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Motivation
Gradient-descent
35 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Motivation
Gradient-descent
36 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
https://www.slideshare.net/DavidKim486/universal-adversarial-perturbation
37 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
What is Adversarial Example?
𝑋 − ෠𝑋 𝑝 < 𝜀
𝑋
෠𝑋
𝑋 ෠𝑋
39 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Examples of Adversarial Example
https://www.kdnuggets.com/2018/10/adversarial-examples-explained.html
?!
?!
40 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
From WWW
41 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 42 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Perturbation's effect on class distributions
43 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
https://www.slideshare.net/DavidKim486/universal-adversarial-perturbation
44 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Examples from Overfitting
• Adversarial Examples rooted in :
• Overfitting
• Excessive Linearity
45 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Examples from Excessive Linearity
• Adversarial Examples rooted in :
• Overfitting
• Excessive Linearity
46 of 84
• The Attack Surface
• The Adversarial Capabilities
• The Adversarial Goals
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Threat Model
47 of 84
• The Attack Surface
• Evasion Attack :: during the testing phase (* the most common type of attack!)
• Poisoning Attack :: during the training time
• Exploratory Attack :: during the testing phase (Given black box access to the model
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Threat Model
try to gain as much knowledge as possible)
http://fna.ir/a5g
48 of 84
• The Adversarial Capabilities
• Training Phase Capabilities
• Data Injection :: does not have any access to the training data as well as to the learning algorithm but has ability to
• Data Modification :: does not have access to the learning algorithm but has full access to the training data
• Logic Corruption :: meddle with the learning algorithm
• Testing Phase Capabilities
• White-Box Attacks :: an adversary has total knowledge about the model (f), algorithm (train), training data distribution (𝜇),
• Black-Box Attacks :: no knowledge about the model and uses information about the settings or past inputs
• Non-Adaptive Black-Box Attack :: only gets access to the target model’s training data distribution (μ)
• Adaptive Black-Box Attack :: doesn’t have any information regarding the training process but can access the target model as an oracle
• Strict Black-Box Attack :: may not contain the data distribution(μ) but has the ability to collect the input-output pairs(x,y) from the
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Threat Model
augment a new data to the training set
target classifier. However, he can not change the inputs to observe the changes in output like an adaptive attack procedure
parameters (𝜃) of the fully trained model architecture
http://fna.ir/a5g
50 of 84
• Adversarial Goals:
• Confidence Reduction
• The adversary tries to reduce the confidence of prediction for the target model
• Misclassification
• The adversary tries to alter the output classification of an input example to any class different
from the original class.
• Targeted Misclassification
• The adversary tries to produce inputs that force the output of the classification model to be a
specific target class
• Source/Target Misclassification
• The adversary attempts to force the output of classification for a specific input to be a
particular target class
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Threat Model
http://fna.ir/a5g
51 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Threat Model
http://fna.ir/a5g
52 of 84
Adversarial example crafting procedures :
1. Direction sensitivity estimation
• The adversary evaluate the sensitivity of a class change to each input feature
• By identifying the direction in the data manifold around the example X
2. Perturbation selection
• The adversary exploits the knowledge of sensitive information to select a perturbation
• Selecting the perturbation 𝛿𝑋
3. Replace 𝑿 with 𝑿 + 𝜹𝑿
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial Example Generation
Most DNN models make this
formulation non-linear and
non-convex, making it hard
to find a closed-solution in
most of the cases
http://fna.ir/a5g
53 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Crafting adversarial examples:
https://thomas-tanay.github.io/post--L2-regularization/http://fna.ir/a5g
55 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Defenses against Adversarial Examples
Defenses
http://www.rmmagazine.com/2016/06/01/the-3-lines-of-defense-for-good-risk-management/
56 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Review ….
?!
?!
57 of 84
❑Defense is hard!
A theoretical model of the adversarial example crafting process is very difficult to construct.
▪ Non-linearity
▪ non-convex
▪ Complex optimization process
▪ …
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Advances in defense strategies
❑Most of the current defense strategies are
▪not adaptive to all types of adversarial attack
❑Implementation of such defense strategies
▪may incur performance overhead
58 of 84
• Removing perturbation with an autoencoder
• Adding noise at test time
• Ensembles
• Confidence-reducing perturbation at test time
• Dropout
• Adding noise at train time
• Various non-linear units
• …
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Failed defenses
http://cs231n.stanford.edu/slides/2017/cs231n_2017_lecture16.pdf
59 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial ☺ Timeline
60 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Defense
Attack
Concept
61 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
62 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
63 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Adversarial Training
64 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
65 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
7
𝑓 𝑥 + 𝜂 ≠ 𝑓 𝑥 𝑓𝑜𝑟 "𝑚𝑜𝑠𝑡" 𝑥~𝑋
𝜂 𝑝≤ 𝜉
ℙ
𝑥~𝑋
𝑓 𝑥 + 𝜂 ≠ 𝑓 𝑥 ≥ 1 − 𝛿
∆𝜂 ← 𝑎𝑟𝑔 min
𝑟
𝑟 2 𝑠. 𝑡. 𝑓 𝑥𝑖 + 𝜂 + 𝑟 ≠ 𝑓 𝑥𝑖
𝒫 𝑝,ξ(η) = arg min
𝜂′
𝜂 − 𝜂′
2 𝑠. 𝑡. 𝜂′
𝑝 ≤ 𝜉൯𝜂 ← 𝒫 𝑝,ξ(η + ∆𝜂𝑖
66 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
7
𝒫 𝑝,ξ(η) = arg min
𝜂′
𝜂 − 𝜂′
2 𝑠. 𝑡. 𝜂′
𝑝 ≤ 𝜉
67 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
68 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Carlini
69 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Samangouei
70 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Tramèr
71 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Samangouei
72 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Stutz
73 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Trends on Adversarial learning
http://fna.ir/a5d
643
0
783
1
979
8
1294
33
CVPR 2019
74 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Adversarial timeline …
Sabokrou, Khalooei, Adeli
75 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
List of toolboxes
ToolBox Base Lib. Usability Updating
Clever-Hans TensorFlow, Pytorch Semi Well (Oct 2019)
Fool-Box TensorFlow, Keras,
Pytorch, MXnet
Easy Well (Oct 2019)
IBM ART python Semi Well (Oct 2019)
AdverTorch Python Semi Well (Dec 2019)
…
77 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
ToolBoxes :: CleverHans
https://github.com/tensorflow/cleverhans
http://www.cleverhans.io/
78 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
ToolBoxes :: CleverHans
https://cleverhans.readthedocs.io/en/latest/
79 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
ToolBoxes :: FoolBox
80 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
ToolBoxes :: FoolBox
81 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
Tips to stay safe
82 of 84
• Decision-boundary crossing
• Vulnerability of deep neural networks in different data
• Different attacks and penetration ways of ML & DL approaches
• Different defense strategies for DNN
• Roadmap of the Adversarial Machine learning
• Attack Toolboxes
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir
A summary ☺
83 of 84
Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 84 of 84

More Related Content

What's hot

PR-231: A Simple Framework for Contrastive Learning of Visual Representations
PR-231: A Simple Framework for Contrastive Learning of Visual RepresentationsPR-231: A Simple Framework for Contrastive Learning of Visual Representations
PR-231: A Simple Framework for Contrastive Learning of Visual RepresentationsJinwon Lee
 
Dropout as a Bayesian Approximation
Dropout as a Bayesian ApproximationDropout as a Bayesian Approximation
Dropout as a Bayesian ApproximationSangwoo Mo
 
A Style-Based Generator Architecture for Generative Adversarial Networks
A Style-Based Generator Architecture for Generative Adversarial NetworksA Style-Based Generator Architecture for Generative Adversarial Networks
A Style-Based Generator Architecture for Generative Adversarial Networksivaderivader
 
Batch normalization presentation
Batch normalization presentationBatch normalization presentation
Batch normalization presentationOwin Will
 
Generative adversarial networks
Generative adversarial networksGenerative adversarial networks
Generative adversarial networks남주 김
 
PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...
PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...
PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...Jinwon Lee
 
Training Neural Networks
Training Neural NetworksTraining Neural Networks
Training Neural NetworksDatabricks
 
[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...
[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...
[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...Deep Learning JP
 
Incremental Machine Learning.pptx
Incremental Machine Learning.pptxIncremental Machine Learning.pptx
Incremental Machine Learning.pptxSHAILIPATEL19
 
Lecture_1_Introduction_to_Adversarial_Machine_Learning.pptx
Lecture_1_Introduction_to_Adversarial_Machine_Learning.pptxLecture_1_Introduction_to_Adversarial_Machine_Learning.pptx
Lecture_1_Introduction_to_Adversarial_Machine_Learning.pptxDevRaj646424
 
Explicit Density Models
Explicit Density ModelsExplicit Density Models
Explicit Density ModelsSangwoo Mo
 
Convolutional neural network from VGG to DenseNet
Convolutional neural network from VGG to DenseNetConvolutional neural network from VGG to DenseNet
Convolutional neural network from VGG to DenseNetSungminYou
 
(2017/06)Practical points of deep learning for medical imaging
(2017/06)Practical points of deep learning for medical imaging(2017/06)Practical points of deep learning for medical imaging
(2017/06)Practical points of deep learning for medical imagingKyuhwan Jung
 
Semantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network ApproachesSemantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network ApproachesFellowship at Vodafone FutureLab
 
Federated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devicesFederated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devicesAlAtfat
 
Self-supervised Learning Lecture Note
Self-supervised Learning Lecture NoteSelf-supervised Learning Lecture Note
Self-supervised Learning Lecture NoteSangwoo Mo
 

What's hot (20)

PR-231: A Simple Framework for Contrastive Learning of Visual Representations
PR-231: A Simple Framework for Contrastive Learning of Visual RepresentationsPR-231: A Simple Framework for Contrastive Learning of Visual Representations
PR-231: A Simple Framework for Contrastive Learning of Visual Representations
 
Dropout as a Bayesian Approximation
Dropout as a Bayesian ApproximationDropout as a Bayesian Approximation
Dropout as a Bayesian Approximation
 
A Style-Based Generator Architecture for Generative Adversarial Networks
A Style-Based Generator Architecture for Generative Adversarial NetworksA Style-Based Generator Architecture for Generative Adversarial Networks
A Style-Based Generator Architecture for Generative Adversarial Networks
 
Batch normalization presentation
Batch normalization presentationBatch normalization presentation
Batch normalization presentation
 
Generative adversarial networks
Generative adversarial networksGenerative adversarial networks
Generative adversarial networks
 
PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...
PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...
PR-330: How To Train Your ViT? Data, Augmentation, and Regularization in Visi...
 
Training Neural Networks
Training Neural NetworksTraining Neural Networks
Training Neural Networks
 
[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...
[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...
[DL輪読会]A Simple Unified Framework for Detecting Out-of-Distribution Samples a...
 
Incremental Machine Learning.pptx
Incremental Machine Learning.pptxIncremental Machine Learning.pptx
Incremental Machine Learning.pptx
 
Lecture_1_Introduction_to_Adversarial_Machine_Learning.pptx
Lecture_1_Introduction_to_Adversarial_Machine_Learning.pptxLecture_1_Introduction_to_Adversarial_Machine_Learning.pptx
Lecture_1_Introduction_to_Adversarial_Machine_Learning.pptx
 
Introduction of VAE
Introduction of VAEIntroduction of VAE
Introduction of VAE
 
Autoencoder
AutoencoderAutoencoder
Autoencoder
 
Explicit Density Models
Explicit Density ModelsExplicit Density Models
Explicit Density Models
 
cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
 
Convolutional neural network from VGG to DenseNet
Convolutional neural network from VGG to DenseNetConvolutional neural network from VGG to DenseNet
Convolutional neural network from VGG to DenseNet
 
(2017/06)Practical points of deep learning for medical imaging
(2017/06)Practical points of deep learning for medical imaging(2017/06)Practical points of deep learning for medical imaging
(2017/06)Practical points of deep learning for medical imaging
 
Semantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network ApproachesSemantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network Approaches
 
Clustering
ClusteringClustering
Clustering
 
Federated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devicesFederated learning and its role in the privacy preservation of IoT devices
Federated learning and its role in the privacy preservation of IoT devices
 
Self-supervised Learning Lecture Note
Self-supervised Learning Lecture NoteSelf-supervised Learning Lecture Note
Self-supervised Learning Lecture Note
 

Similar to Robustness of Deep Neural Networks

Unboxing the black boxes (Deprecated version)
Unboxing the black boxes (Deprecated version)Unboxing the black boxes (Deprecated version)
Unboxing the black boxes (Deprecated version)BLECKWEN
 
Unboxing the black boxes (Updated version November '18)
Unboxing the black boxes  (Updated version November '18)Unboxing the black boxes  (Updated version November '18)
Unboxing the black boxes (Updated version November '18)BLECKWEN
 
Lecture_9_Poisoning_Attacks_and_Defenses.pptx
Lecture_9_Poisoning_Attacks_and_Defenses.pptxLecture_9_Poisoning_Attacks_and_Defenses.pptx
Lecture_9_Poisoning_Attacks_and_Defenses.pptxssuserbdf7ef
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
Risk Management for LLMs
Risk Management for LLMsRisk Management for LLMs
Risk Management for LLMsSri Ambati
 
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...Mohammed Almeshekah
 
Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018
Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018
Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018Sri Ambati
 
Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.
Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.
Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.anant90
 
Subverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profitSubverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profitRam Shankar Siva Kumar
 
Military simulator a case study
Military simulator  a case studyMilitary simulator  a case study
Military simulator a case studyShruti Jadon
 
Military simulator a case study
Military simulator  a case studyMilitary simulator  a case study
Military simulator a case studyShruti Jadon
 
Bringing Red vs. Blue to Machine Learning
Bringing Red vs. Blue to Machine LearningBringing Red vs. Blue to Machine Learning
Bringing Red vs. Blue to Machine LearningBobby Filar
 
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019anant90
 
Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!
Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!
Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!Sri Ambati
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsAdam Shostack
 
Generative Adversarial Network
Generative Adversarial NetworkGenerative Adversarial Network
Generative Adversarial Networkkhalooei
 
Main principles of Data Science and Machine Learning
Main principles of Data Science and Machine LearningMain principles of Data Science and Machine Learning
Main principles of Data Science and Machine LearningNikolay Karelin
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Ram Shankar Siva Kumar
 
Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2Ivo Andreev
 

Similar to Robustness of Deep Neural Networks (20)

Unboxing the black boxes (Deprecated version)
Unboxing the black boxes (Deprecated version)Unboxing the black boxes (Deprecated version)
Unboxing the black boxes (Deprecated version)
 
Unboxing the black boxes (Updated version November '18)
Unboxing the black boxes  (Updated version November '18)Unboxing the black boxes  (Updated version November '18)
Unboxing the black boxes (Updated version November '18)
 
ML.pdf
ML.pdfML.pdf
ML.pdf
 
Lecture_9_Poisoning_Attacks_and_Defenses.pptx
Lecture_9_Poisoning_Attacks_and_Defenses.pptxLecture_9_Poisoning_Attacks_and_Defenses.pptx
Lecture_9_Poisoning_Attacks_and_Defenses.pptx
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Risk Management for LLMs
Risk Management for LLMsRisk Management for LLMs
Risk Management for LLMs
 
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
 
Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018
Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018
Machine Learning Interpretability - Mateusz Dymczyk - H2O AI World London 2018
 
Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.
Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.
Mozfest 2018 session slides: Let's fool modern A.I. systems with stickers.
 
Subverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profitSubverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profit
 
Military simulator a case study
Military simulator  a case studyMilitary simulator  a case study
Military simulator a case study
 
Military simulator a case study
Military simulator  a case studyMilitary simulator  a case study
Military simulator a case study
 
Bringing Red vs. Blue to Machine Learning
Bringing Red vs. Blue to Machine LearningBringing Red vs. Blue to Machine Learning
Bringing Red vs. Blue to Machine Learning
 
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
 
Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!
Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!
Get hands-on with Explainable AI at Machine Learning Interpretability(MLI) Gym!
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
 
Generative Adversarial Network
Generative Adversarial NetworkGenerative Adversarial Network
Generative Adversarial Network
 
Main principles of Data Science and Machine Learning
Main principles of Data Science and Machine LearningMain principles of Data Science and Machine Learning
Main principles of Data Science and Machine Learning
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense
 
Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2
 

More from khalooei

Robustness of Deep Neural Networks | Adversarial attacks and defenses
Robustness of Deep Neural Networks | Adversarial attacks and defensesRobustness of Deep Neural Networks | Adversarial attacks and defenses
Robustness of Deep Neural Networks | Adversarial attacks and defenseskhalooei
 
Life of Points (Machine learning with Orange flavor)
Life of Points (Machine learning with Orange flavor) Life of Points (Machine learning with Orange flavor)
Life of Points (Machine learning with Orange flavor) khalooei
 
Generative Adversarial Networks - (Applications)
Generative Adversarial Networks - (Applications)Generative Adversarial Networks - (Applications)
Generative Adversarial Networks - (Applications)khalooei
 
Generative Adversarial Networks - (Introduction)
Generative Adversarial Networks  - (Introduction)Generative Adversarial Networks  - (Introduction)
Generative Adversarial Networks - (Introduction)khalooei
 
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)khalooei
 
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌دادهتحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌دادهkhalooei
 

More from khalooei (6)

Robustness of Deep Neural Networks | Adversarial attacks and defenses
Robustness of Deep Neural Networks | Adversarial attacks and defensesRobustness of Deep Neural Networks | Adversarial attacks and defenses
Robustness of Deep Neural Networks | Adversarial attacks and defenses
 
Life of Points (Machine learning with Orange flavor)
Life of Points (Machine learning with Orange flavor) Life of Points (Machine learning with Orange flavor)
Life of Points (Machine learning with Orange flavor)
 
Generative Adversarial Networks - (Applications)
Generative Adversarial Networks - (Applications)Generative Adversarial Networks - (Applications)
Generative Adversarial Networks - (Applications)
 
Generative Adversarial Networks - (Introduction)
Generative Adversarial Networks  - (Introduction)Generative Adversarial Networks  - (Introduction)
Generative Adversarial Networks - (Introduction)
 
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده (2)
 
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌دادهتحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده
تحلیل با رویکرد یادگیری ژرف بر بستر کلان‌داده
 

Recently uploaded

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Recently uploaded (20)

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Robustness of Deep Neural Networks

  • 1. Robustness of Deep Neural Networks Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 1 of 80
  • 2. Robustness of Deep Neural Networks Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 2 of 80
  • 3. • Decision-boundary crossing • Vulnerability of deep neural networks in different data • Different attacks and penetration ways of ML & DL approaches • Attack Toolboxes • Different defense strategies for DNN • Tips to stay safe in DNN Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Outlines 3 of 84
  • 4. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Data https://www.slideshare.net/BrianKim244/dcgan-77452250 𝑑2 𝑑1 c 4 of 84
  • 5. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Data https://www.slideshare.net/BrianKim244/dcgan-77452250 c 𝑑1 × 𝑑2 × 𝑐 0.975 , 0.2, 0.0023, 0.5, ….. , 0.5156 𝑑2 𝑑1 5 of 84
  • 6. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Data 6 of 84
  • 7. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Data https://www.slideshare.net/BrianKim244/dcgan-77452250 7 of 84
  • 8. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Life of the points … https://www.slideshare.net/khalooei/life-of-points-machine-learning-with-orange-flavor https://ceit.aut.ac.ir/~khalooei/presentations/ https://www.slideshare.net/khalooei/life-of-points-machine-learning-with-orange-flavor 8 of 84
  • 9. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Discriminative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 9 of 84
  • 10. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Discriminative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 10 of 84
  • 11. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Discriminative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 11 of 84
  • 12. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Discriminative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 12 of 84
  • 13. Generative Model Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Generative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 TrainingData Training Generated Data Unseen new data 13 of 84
  • 14. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Generative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 Distribution of the actual images 14 of 84
  • 15. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Generative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 15 of 84
  • 16. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Generative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 16 of 84
  • 17. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Generative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 17 of 84
  • 18. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review:: Generative Model https://www.slideshare.net/BrianKim244/dcgan-77452250 Distribution of the actual images 18 of 84
  • 19. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Decision boundary crossing https://scikit-learn.org/stable/auto_examples/classification/plot_classifier_comparison.html 19 of 84
  • 20. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Decision boundary crossing http://www.cse.chalmers.se/~richajo/dit866/lectures/l3/Plotting%20decision%20boundaries.html Decision Tree Perceptron 20 of 84
  • 21. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Vulnerability of Deep Neural Networks https://www.euclidean.com/deep-learning-and-value-investing 21 of 84
  • 22. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir AI and the top innovation https://www.usenix.org/sites/default/files/conference/protected-files/enigma17_slides_papernot.pdf 22 of 84
  • 23. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir AI and the top innovation 23 of 84
  • 24. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir AI and the top innovation 24 of 84
  • 25. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Machine learning … Adversarial Machine Learning, Author(s): Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar Publisher: Cambridge University Press, Year: 2019 25 of 84
  • 26. Fooling Google's image- recognition AI 1000x faster Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir On the line of recent researches … ` December 20 '17 26 of 84
  • 27. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir On the line of recent researches … https://syncedreview.com/2019/04/24/now-you-see-me-now-you-dont-fooling-a-person-detector/ 27 of 84
  • 28. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir On the line of recent researches … https://towardsdatascience.com/evasion-attacks-on-machine-learning-or-adversarial-examples-12f2283e06a1 28 of 84
  • 29. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir An interesting usage :: Google verification! 29 of 84
  • 30. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir On the line of recent researches … Audio Adversarial Examples: Targeted Attacks on Speech-to-Text Nicholas Carlini, David Wagner Deep Learning and Security Workshop, 2018. Best Paper 30 of 84
  • 31. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir On the line of recent researches … Generating Natural Language Adversarial Examples Moustafa Alzantot, Yash Sharma, Ahmed Elgohary, Bo-Jhang Ho, Mani B. Srivastava, Kai-Wei Chang Published in EMNLP 2018 DOI:10.18653/v1/d18-1316 31 of 84
  • 32. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Delving into the problem … 32 of 84
  • 33. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Motivation 33 of 84
  • 34. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Motivation Gradient-descent 34 of 84
  • 35. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Motivation Gradient-descent 35 of 84
  • 36. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Motivation Gradient-descent 36 of 84
  • 37. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir https://www.slideshare.net/DavidKim486/universal-adversarial-perturbation 37 of 84
  • 38. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir What is Adversarial Example? 𝑋 − ෠𝑋 𝑝 < 𝜀 𝑋 ෠𝑋 𝑋 ෠𝑋 39 of 84
  • 39. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Examples of Adversarial Example https://www.kdnuggets.com/2018/10/adversarial-examples-explained.html ?! ?! 40 of 84
  • 40. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir From WWW 41 of 84
  • 41. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 42 of 84
  • 42. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Perturbation's effect on class distributions 43 of 84
  • 43. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir https://www.slideshare.net/DavidKim486/universal-adversarial-perturbation 44 of 84
  • 44. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Examples from Overfitting • Adversarial Examples rooted in : • Overfitting • Excessive Linearity 45 of 84
  • 45. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Examples from Excessive Linearity • Adversarial Examples rooted in : • Overfitting • Excessive Linearity 46 of 84
  • 46. • The Attack Surface • The Adversarial Capabilities • The Adversarial Goals Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Threat Model 47 of 84
  • 47. • The Attack Surface • Evasion Attack :: during the testing phase (* the most common type of attack!) • Poisoning Attack :: during the training time • Exploratory Attack :: during the testing phase (Given black box access to the model Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Threat Model try to gain as much knowledge as possible) http://fna.ir/a5g 48 of 84
  • 48. • The Adversarial Capabilities • Training Phase Capabilities • Data Injection :: does not have any access to the training data as well as to the learning algorithm but has ability to • Data Modification :: does not have access to the learning algorithm but has full access to the training data • Logic Corruption :: meddle with the learning algorithm • Testing Phase Capabilities • White-Box Attacks :: an adversary has total knowledge about the model (f), algorithm (train), training data distribution (𝜇), • Black-Box Attacks :: no knowledge about the model and uses information about the settings or past inputs • Non-Adaptive Black-Box Attack :: only gets access to the target model’s training data distribution (μ) • Adaptive Black-Box Attack :: doesn’t have any information regarding the training process but can access the target model as an oracle • Strict Black-Box Attack :: may not contain the data distribution(μ) but has the ability to collect the input-output pairs(x,y) from the Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Threat Model augment a new data to the training set target classifier. However, he can not change the inputs to observe the changes in output like an adaptive attack procedure parameters (𝜃) of the fully trained model architecture http://fna.ir/a5g 50 of 84
  • 49. • Adversarial Goals: • Confidence Reduction • The adversary tries to reduce the confidence of prediction for the target model • Misclassification • The adversary tries to alter the output classification of an input example to any class different from the original class. • Targeted Misclassification • The adversary tries to produce inputs that force the output of the classification model to be a specific target class • Source/Target Misclassification • The adversary attempts to force the output of classification for a specific input to be a particular target class Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Threat Model http://fna.ir/a5g 51 of 84
  • 50. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Threat Model http://fna.ir/a5g 52 of 84
  • 51. Adversarial example crafting procedures : 1. Direction sensitivity estimation • The adversary evaluate the sensitivity of a class change to each input feature • By identifying the direction in the data manifold around the example X 2. Perturbation selection • The adversary exploits the knowledge of sensitive information to select a perturbation • Selecting the perturbation 𝛿𝑋 3. Replace 𝑿 with 𝑿 + 𝜹𝑿 Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial Example Generation Most DNN models make this formulation non-linear and non-convex, making it hard to find a closed-solution in most of the cases http://fna.ir/a5g 53 of 84
  • 52. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Crafting adversarial examples: https://thomas-tanay.github.io/post--L2-regularization/http://fna.ir/a5g 55 of 84
  • 53. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Defenses against Adversarial Examples Defenses http://www.rmmagazine.com/2016/06/01/the-3-lines-of-defense-for-good-risk-management/ 56 of 84
  • 54. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Review …. ?! ?! 57 of 84
  • 55. ❑Defense is hard! A theoretical model of the adversarial example crafting process is very difficult to construct. ▪ Non-linearity ▪ non-convex ▪ Complex optimization process ▪ … Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Advances in defense strategies ❑Most of the current defense strategies are ▪not adaptive to all types of adversarial attack ❑Implementation of such defense strategies ▪may incur performance overhead 58 of 84
  • 56. • Removing perturbation with an autoencoder • Adding noise at test time • Ensembles • Confidence-reducing perturbation at test time • Dropout • Adding noise at train time • Various non-linear units • … Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Failed defenses http://cs231n.stanford.edu/slides/2017/cs231n_2017_lecture16.pdf 59 of 84
  • 57. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial ☺ Timeline 60 of 84
  • 58. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Defense Attack Concept 61 of 84
  • 59. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … 62 of 84
  • 60. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … 63 of 84
  • 61. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Adversarial Training 64 of 84
  • 62. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … 65 of 84
  • 63. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … 7 𝑓 𝑥 + 𝜂 ≠ 𝑓 𝑥 𝑓𝑜𝑟 "𝑚𝑜𝑠𝑡" 𝑥~𝑋 𝜂 𝑝≤ 𝜉 ℙ 𝑥~𝑋 𝑓 𝑥 + 𝜂 ≠ 𝑓 𝑥 ≥ 1 − 𝛿 ∆𝜂 ← 𝑎𝑟𝑔 min 𝑟 𝑟 2 𝑠. 𝑡. 𝑓 𝑥𝑖 + 𝜂 + 𝑟 ≠ 𝑓 𝑥𝑖 𝒫 𝑝,ξ(η) = arg min 𝜂′ 𝜂 − 𝜂′ 2 𝑠. 𝑡. 𝜂′ 𝑝 ≤ 𝜉൯𝜂 ← 𝒫 𝑝,ξ(η + ∆𝜂𝑖 66 of 84
  • 64. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … 7 𝒫 𝑝,ξ(η) = arg min 𝜂′ 𝜂 − 𝜂′ 2 𝑠. 𝑡. 𝜂′ 𝑝 ≤ 𝜉 67 of 84
  • 65. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … 68 of 84
  • 66. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Carlini 69 of 84
  • 67. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Samangouei 70 of 84
  • 68. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Tramèr 71 of 84
  • 69. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Samangouei 72 of 84
  • 70. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Stutz 73 of 84
  • 71. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Trends on Adversarial learning http://fna.ir/a5d 643 0 783 1 979 8 1294 33 CVPR 2019 74 of 84
  • 72. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Adversarial timeline … Sabokrou, Khalooei, Adeli 75 of 84
  • 73. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir List of toolboxes ToolBox Base Lib. Usability Updating Clever-Hans TensorFlow, Pytorch Semi Well (Oct 2019) Fool-Box TensorFlow, Keras, Pytorch, MXnet Easy Well (Oct 2019) IBM ART python Semi Well (Oct 2019) AdverTorch Python Semi Well (Dec 2019) … 77 of 84
  • 74. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir ToolBoxes :: CleverHans https://github.com/tensorflow/cleverhans http://www.cleverhans.io/ 78 of 84
  • 75. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir ToolBoxes :: CleverHans https://cleverhans.readthedocs.io/en/latest/ 79 of 84
  • 76. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir ToolBoxes :: FoolBox 80 of 84
  • 77. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir ToolBoxes :: FoolBox 81 of 84
  • 78. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir Tips to stay safe 82 of 84
  • 79. • Decision-boundary crossing • Vulnerability of deep neural networks in different data • Different attacks and penetration ways of ML & DL approaches • Different defense strategies for DNN • Roadmap of the Adversarial Machine learning • Attack Toolboxes Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir A summary ☺ 83 of 84
  • 80. Robustness of Deep Neural Networks Mohammad Khalooei | khalooei@aut.ac.ir 84 of 84