Open Access System for Information Sharing

Login Library

 

Article
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorJi, Sangwoo-
dc.contributor.authorPark, Namgyu-
dc.contributor.authorNa, Dongbin-
dc.contributor.authorZhu, Bin-
dc.contributor.authorKim, Jong-
dc.date.accessioned2023-07-11T01:40:50Z-
dc.date.available2023-07-11T01:40:50Z-
dc.date.created2022-09-29-
dc.date.issued2022-10-
dc.identifier.issn1077-3142-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/117883-
dc.description.abstract© 2022 Elsevier Inc.Transfer learning is preferable for training a deep neural network with a small training dataset by leveraging a pre-trained teacher model. However, transfer learning opens a door for new attacks that generate adversarial examples using the pre-trained teacher model. In this paper, we propose a novel method called feature distancing to defend against adversarial attacks tailored to transfer learning. The method aims to train a student model with a distinct feature representation from the teacher model. We generate adversarial examples of the mimic attack with the teacher model, and the examples are used to train the student model. We use triplet loss to put the mimic attack examples close to their source images and far from their target images in the feature space of the student model. The proposed method is evaluated on three different transfer learning tasks with diverse attack configurations. It is the only method that achieves high “robust accuracy” and high “test accuracy” on every task we evaluate.-
dc.languageEnglish-
dc.publisherAcademic Press Inc.-
dc.relation.isPartOfComputer Vision and Image Understanding-
dc.titleDefending against attacks tailored to transfer learning via feature distancing-
dc.typeArticle-
dc.identifier.doi10.1016/j.cviu.2022.103533-
dc.type.rimsART-
dc.identifier.bibliographicCitationComputer Vision and Image Understanding, v.223-
dc.identifier.wosid000864655200004-
dc.citation.titleComputer Vision and Image Understanding-
dc.citation.volume223-
dc.contributor.affiliatedAuthorJi, Sangwoo-
dc.contributor.affiliatedAuthorPark, Namgyu-
dc.contributor.affiliatedAuthorNa, Dongbin-
dc.contributor.affiliatedAuthorKim, Jong-
dc.identifier.scopusid2-s2.0-85136661502-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.type.docTypeArticle-
dc.subject.keywordAuthorAdversarial example-
dc.subject.keywordAuthorMimic attack-
dc.subject.keywordAuthorRobust transfer learning-
dc.subject.keywordAuthorTarget-agnostic attack-
dc.subject.keywordAuthorTriplet loss-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse