2019
DOI: 10.1007/s11042-019-7353-6
|View full text |Cite
|
Sign up to set email alerts
|

Integration of statistical detector and Gaussian noise injection detector for adversarial example detection in deep neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…We next compare the performance of the combination of the two detectors with that of the integrated detector [12] and feature squeezing detector [33]. e proposed detector achieves highest TPR on adversarial examples produced by FGSM, R-FGSM, BIM, and UAP.…”
Section: Results Of Combination Of Two Detectorsmentioning
confidence: 99%
See 3 more Smart Citations
“…We next compare the performance of the combination of the two detectors with that of the integrated detector [12] and feature squeezing detector [33]. e proposed detector achieves highest TPR on adversarial examples produced by FGSM, R-FGSM, BIM, and UAP.…”
Section: Results Of Combination Of Two Detectorsmentioning
confidence: 99%
“…Xu et al [33] introduced feature squeezing, an approach to detect adversarial examples by comparing the predictions of the targeted network on the original input and the squeezed input. Fan et al [12] proposed an integrated detection framework comprising the statistical detector and Gaussian noise injection detector to filter out adversarial examples with different characteristics of perturbations.…”
Section: Adversarial Examples Detectingmentioning
confidence: 99%
See 2 more Smart Citations
“…However, these detection methods cannot effectively resist C&W attacks. Some works elaborate the detection based on preprocessing manipulations, such as denoising filter (DF for short) via scalar quantization and smoothing spatial filter [17], feature squeezing (FS for short) [18], the Gaussian noise injection detector [19]. Inspired by the view that "the adversarial attack can be treated as a sort of accidental steganography" provide by Goodfellow et al [20], some steganalysis-based methods are proposed, such as ESRM [21], SRNet [22].…”
Section: Introductionmentioning
confidence: 99%