Attack method and device based on genetic algorithm and computer program product

A genetic algorithm and attack data technology, applied in genetic rules, computer components, calculations, etc., can solve problems such as large amount of calculation and long time, and achieve the effect of improving attack efficiency

Pending Publication Date: 2022-05-17
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current attack method generally generates random disturbances within the maximum permissible disturbance range to iteratively find adversarial samples, which requires a large amount of calculation and takes a long time to conduct an attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack method and device based on genetic algorithm and computer program product
  • Attack method and device based on genetic algorithm and computer program product
  • Attack method and device based on genetic algorithm and computer program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0020] In the technical solution of this disclosure, the collection, storage, use, processing, transmission, provision, and disclosure of user personal information involved are all in compliance with relevant laws and regulations, and do not violate public order and good customs.

[0021] figure 1 An exemplary architecture 100 to which the genetic algorithm-based attac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack method and device based on a genetic algorithm, electronic equipment, a storage medium and a computer program product, relates to the technical field of artificial intelligence, in particular to computer vision, image recognition and deep learning technologies, and can be used in an attack resisting scene. According to the specific implementation scheme, a target image is acquired; starting from the initial disturbance range, determining an adversarial sample of the target model based on the target image in the current disturbance range by adopting a genetic algorithm, and increasing the disturbance range under the condition that the adversarial sample is not successfully determined so as to continuously carry out adversarial attack on the target model until a preset end condition is met; and determining attack data finally obtained based on the attack target model. According to the method and the device, the problems of high calculation cost and low confrontation sample determination efficiency caused by directly attacking the target model in a relatively large disturbance range can be effectively solved, and the attack efficiency is improved.

Description

technical field [0001] The present disclosure relates to the field of artificial intelligence technology, specifically to computer vision, image recognition and deep learning technologies, and in particular to an attack method, device, electronic device, storage medium, and computer program product based on a genetic algorithm, which can be used in adversarial attack scenarios. Background technique [0002] Image processing is an important application of artificial intelligence technology. With the continuous popularization of image processing models based on neural network models, many attack algorithms for image recognition models have emerged in recent years. By adding a small perturbation to the original image, the recognition result of the model to the changed image can be disturbed, but it does not affect the recognition of the image by the human eye. If this technology is used improperly, it will cause illegal content to bypass the automatic review model and be releas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06V10/774G06K9/62G06N3/12
CPCG06N3/126G06F18/241G06F18/214
Inventor 干逸显王洋张华正黄英仁吕中厚田伟娟
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products