Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent Defense Algorithm Recommendation Method and System Based on Multiple Adversarial Example Attacks

A recommendation system and adversarial sample technology, applied in computing, computing models, computer security devices, etc., can solve problems such as recommendation and evaluation systems without defense algorithms, and achieve the effect of reducing losses

Active Publication Date: 2021-10-29
ZHEJIANG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most of the defense algorithms are a static defense method that only targets specific examples of attacks, and there is no unified defense algorithm recommendation and evaluation system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent Defense Algorithm Recommendation Method and System Based on Multiple Adversarial Example Attacks
  • Intelligent Defense Algorithm Recommendation Method and System Based on Multiple Adversarial Example Attacks
  • Intelligent Defense Algorithm Recommendation Method and System Based on Multiple Adversarial Example Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be noted that the following embodiments are intended to facilitate the understanding of the present invention, but do not limit it in any way.

[0054] Such as figure 1 As shown, the intelligent defense algorithm recommendation system of the present invention includes three major modules: the original data cleaning module, the confrontation attack module, and the attack evaluation and defense algorithm recommendation module. The functions of each module are as follows:

[0055] 1. Raw data cleaning module

[0056] The main job of this module is to clean user data. In general scenarios, the data collected by users in different fields may contain noise. Before training the target recognition model, it is necessary to filter the noise data to ensure the accuracy of the model trained in the training phase. In addition, the learning phase o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for recommending an intelligent defense algorithm based on various adversarial example attacks, comprising the following steps: cleaning the original data set to obtain a training set; using the training set to train a target recognition model to obtain a target attack model; selecting different The adversarial example attack algorithm and the target attack model; quantitatively evaluate the attack success rate of each adversarial example attack algorithm, and select the target attack algorithm according to the attack success rate; for each target attack algorithm, apply the adversarial attack defense algorithm one by one for defense ; According to the defense result, recommend the corresponding defense algorithm against attack to the user. The invention also discloses an intelligent defense algorithm recommendation system adopted in the intelligent defense algorithm recommendation method. For a specific target model, the intelligent defense algorithm recommendation system of the present invention can intelligently recommend an effective defense algorithm, thereby reducing the loss caused to the target model by adversarial example attacks.

Description

technical field [0001] The invention relates to the technical field of anti-example attacks and defenses in machine learning model security and privacy issues, and in particular to an intelligent defense algorithm recommendation method and system based on various anti-example attacks. Background technique [0002] Machine learning is the core of artificial intelligence. In recent years, machine learning has achieved unprecedented development, and its application has spread across various fields of artificial intelligence. Especially in the fields of data mining, computer vision, natural language processing, speech and handwriting recognition, driverless driving, etc., the application of machine learning has achieved great success. Nowadays, machine learning has received extensive attention and in-depth research, both in academia and industry. The development of machine learning has entered a new stage. Various machine learning algorithms and models emerge in an endless stre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06N20/00G06F16/215G06F21/55
CPCG06F21/554
Inventor 纪守领李进锋陈建海
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products