2022
DOI: 10.1371/journal.pone.0265723
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial robustness assessment: Why in evaluation both L0 and L∞ attacks are necessary

Abstract: There are different types of adversarial attacks and defences for machine learning algorithms which makes assessing the robustness of an algorithm a daunting task. Moreover, there is an intrinsic bias in these adversarial attacks and defences to make matters worse. Here, we organise the problems faced: a) Model Dependence, b) Insufficient Evaluation, c) False Adversarial Samples, and d) Perturbation Dependent Results. Based on this, we propose a model agnostic adversarial robustness assessment method based on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…37 In contrast to the present study, which assumed no learning (i.e., no plasticity) in the network during a task, previous pioneering experiments of robotic embodiments of a living neuronal network exploited Hebbian plasticity within networks to optimize sensory-motor coupling for a given task. [22][23][24][25][26][27][28] These contradictory strategies in embodiment experiments have confirmed that both the homeostatic property and Hebbian learning play substantial roles in task solving in the brain. 29,30 A synergetic effect should be con ment experiments and in the theory of brain…”
Section: Theoretical Background On Morphological Computationmentioning
confidence: 80%
See 1 more Smart Citation
“…37 In contrast to the present study, which assumed no learning (i.e., no plasticity) in the network during a task, previous pioneering experiments of robotic embodiments of a living neuronal network exploited Hebbian plasticity within networks to optimize sensory-motor coupling for a given task. [22][23][24][25][26][27][28] These contradictory strategies in embodiment experiments have confirmed that both the homeostatic property and Hebbian learning play substantial roles in task solving in the brain. 29,30 A synergetic effect should be con ment experiments and in the theory of brain…”
Section: Theoretical Background On Morphological Computationmentioning
confidence: 80%
“…Recently, there has been a resurgence of interest in RC as a compelling biological model of neural networks, driven by its potential for scalability through physical implementations. Additionally, problems in deep learning such as adversarial attacks and robustness/adaptiveness issues have also contributed to an increase in interest in alternative paradigms [17,18,19,20,21,22].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the choice of perturbation level by the L0-norm or L∞-norm metric does not depend on the image size, which is convenient for comparison. In the experiments, the formation of attacks is proposed to be implemented on the basis of the search algorithm of the covariance matrix adaptation evolution strategy (CMA-ES) using the L∞ metric [33].…”
Section: Results Of Machine Learning and Discussionmentioning
confidence: 99%
“…The experimental results showed that the method can improve the success rate of the attack while maintaining the advantage of having a low degree of perturbation. In proposing a model-independent dual-quality assessment for adversarial machine learning, Vargas et al [ 37 , 38 ] developed the Covariance Matrix Adaptation Evolution Strategy for a novel black-box attack, verifying the effectiveness of the adaptive strategy in improving the OPA performance. After that, Su et al in [ 39 ] further showed the promises of evolutionary computation.…”
Section: Related Workmentioning
confidence: 99%
“…Our method, as one of the optimization methods of the OPA, was also compared with other optimization schemes such as Jing Adaptive Differential Evolution (JADE) [ 35 ], Particle Swarm-based Optimization (PSO) [ 36 ], and Covariance Matrix Adaptation Evolution Strategy (CMA-ES) [ 37 , 38 ] (described in detail in Section 2 ). These methods also aimed to implement the adversarial example attack by modifying the image with only very few pixels.…”
Section: Experiments and Analysismentioning
confidence: 99%