Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach

Author:

Alkhowaiter Mohammed12ORCID,Kholidy Hisham3ORCID,Alyami Mnassar A.1,Alghamdi Abdulmajeed1,Zou Cliff1

Affiliation:

1. College of Engineering and Computer Science, University of Central Florida, Orlando, FL 32816, USA

2. College of Computer Engineering and Science, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia

3. College of Engineering, SUNY Polytechnic Institute, Utica, NY 13502, USA

Abstract

Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes. Our study of major adversarial attack models shows that they all specifically target and exploit the neural networking structures in their designs. This understanding led us to develop a hypothesis that most classical machine learning models, such as random forest (RF), are immune to adversarial attack models because they do not rely on neural network design at all. Our experimental study of classical machine learning models against popular adversarial attacks supports this hypothesis. Based on this hypothesis, we propose a new adversarial-aware deep learning system by using a classical machine learning model as the secondary verification system to complement the primary deep learning model in image classification. Although the secondary classical machine learning model has less accurate output, it is only used for verification purposes, which does not impact the output accuracy of the primary deep learning model, and, at the same time, can effectively detect an adversarial attack when a clear mismatch occurs. Our experiments based on the CIFAR-100 dataset show that our proposed approach outperforms current state-of-the-art adversarial defense systems.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Adaptative Access Management in 5G IoE using Device Fingerprinting: Discourse, Mechanisms, Challenges, and Opportunities;2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA);2023-12-04

2. Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures;2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA);2023-12-04

3. Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification;2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA);2023-12-04

4. Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks;2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA);2023-12-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3