Model security evaluation method and device, medium and computing equipment

An evaluation device and security technology, applied in computer security devices, calculations, calculation models, etc., can solve problems such as high use threshold, insufficiently advanced algorithms, and inability to provide users with comprehensive model security evaluation solutions, so as to improve comprehensiveness and reliability The effect of sexuality and good experience

Active Publication Date: 2020-11-17
BEIJING REALAI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] To sum up, the shortcomings of the existing technology are not only that the algorithm is not advanced enough, but also has a high threshold for use, and can only try to verify whether the model may have security risks, and cannot provide users with a comprehensive and easy-to-use model security evaluation Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Model security evaluation method and device, medium and computing equipment
  • Model security evaluation method and device, medium and computing equipment
  • Model security evaluation method and device, medium and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0066] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0067] According to the embodiments of the present invention, a model security evaluation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a model security evaluation method and device, a medium and computing equipment. The method comprises the steps of reading a to-be-evaluated model and relatedinformation; constructing an evaluation task according to the to-be-evaluated model and the related information, with an evaluation task comprising a plurality of evaluation sub-tasks for executing different attack strategies; executing each evaluation sub-task to obtain a corresponding sub-task evaluation result; and obtaining a final evaluation result based on each sub-task evaluation result andthe corresponding weight. Multiple strategies are selected for evaluation, so that the comprehensiveness and reliability of evaluation are remarkably improved, and better experience is brought to users.

Description

technical field [0001] Embodiments of the present invention relate to the field of artificial intelligence, and more specifically, embodiments of the present invention relate to a model security assessment method, medium, device, and computing device. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] In recent years, the rapid development of artificial intelligence technology represented by machine learning, especially deep learning, is profoundly changing human production and lifestyle. However, while artificial intelligence is rapidly promoting technological revolution and industrial progress, its security risks are often overlooked. ignore. Studies have found that many well-performing algorithms are easily deceived by adversarial examples that are difficult for the hum...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/56G06N20/00
CPCG06F21/562G06F21/577G06F2221/033G06N20/00
Inventor 萧子豪唐家渝张旭东董胤鹏田天
Owner BEIJING REALAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products