Robust Proxy: Improving Adversarial Robustness by Robust Proxy Learning

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 70
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Hong Jooko
dc.contributor.authorRo, Yong Manko
dc.date.accessioned2023-07-30T08:00:45Z-
dc.date.available2023-07-30T08:00:45Z-
dc.date.created2023-06-14-
dc.date.created2023-06-14-
dc.date.issued2023-06-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.18, pp.4021 - 4033-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10203/310957-
dc.description.abstractRecently, it has been widely known that deep neural networks are highly vulnerable and easily broken by adversarial attacks. To mitigate the adversarial vulnerability, many defense algorithms have been proposed. Recently, to improve adversarial robustness, many works try to enhance feature representation by imposing more direct supervision on the discriminative feature. However, existing approaches lack an understanding of learning adversarially robust feature representation. In this paper, we propose a novel training framework called Robust Proxy Learning. In the proposed method, the model explicitly learns robust feature representations with robust proxies. To this end, firstly, we demonstrate that we can generate class-representative robust features by adding class-wise robust perturbations. Then, we use the class representative features as robust proxies. With the class-wise robust features, the model explicitly learns adversarially robust features through the proposed robust proxy learning framework. Through extensive experiments, we verify that we can manually generate robust features, and our proposed learning framework could increase the robustness of the DNNs.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleRobust Proxy: Improving Adversarial Robustness by Robust Proxy Learning-
dc.typeArticle-
dc.identifier.wosid001028970200001-
dc.identifier.scopusid2-s2.0-85163530302-
dc.type.rimsART-
dc.citation.volume18-
dc.citation.beginningpage4021-
dc.citation.endingpage4033-
dc.citation.publicationnameIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.identifier.doi10.1109/TIFS.2023.3288672-
dc.contributor.localauthorRo, Yong Man-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorRobust perturbation-
dc.subject.keywordAuthorclass-wise robust perturbation-
dc.subject.keywordAuthorrobust proxy learning-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0