辉县网站建设,org域名做网站,网站定位广告,网络营销方式有哪些 各有什么特点ADVERSARIAL EXAMPLE GENERATION
研究推动 ML 模型变得更快、更准、更高效。设计和模型的安全性和鲁棒性经常被忽视#xff0c;尤其是面对那些想愚弄模型故意对抗时。
本教程将提供您对 ML 模型的安全漏洞的认识#xff0c;并将深入了解对抗性机器学习这一热门话题。在图像…ADVERSARIAL EXAMPLE GENERATION
研究推动 ML 模型变得更快、更准、更高效。设计和模型的安全性和鲁棒性经常被忽视尤其是面对那些想愚弄模型故意对抗时。
本教程将提供您对 ML 模型的安全漏洞的认识并将深入了解对抗性机器学习这一热门话题。在图像中添加难以察觉的扰动会导致模型性能的显著不同鉴于这是一个教程我们将通过图像分类器的示例来探讨这个主题。具体来说我们将使用第一种也是最流行的攻击方法之一快速梯度符号攻击 FGSM 来欺骗 MNIST 分类器。
Threat Model (攻击模型)
在论文中有许多类型的对抗攻击每种攻击都有不同的目标和攻击者的知识假设。然而总的来说首要目标是向输入数据添加最小数量的扰动以导致期望的错误分类。攻击者的知识有几种假设其中两种是 white-box (白盒)和 black-box 黑盒白盒攻击假定攻击者具有对模型的完整知识和访问权限包括体系结构、输入、输出和权重。黑盒攻击假设攻击者只能访问模型的输入和输出并且对底层架构或权重一无所知。还有几种类型的目标包括 misclassification 错误分类和 source/target misclassification 源/目标错误分类。错误分类的目标意味着对手只希望输出分类错误而不在乎新的分类是什么。源/目标错误分类意味着对手希望更改最初属于特定源类别的图像从而将其分类为特定目标类别。
Fast Gradient Sign Attack
FGSM 攻击是白盒攻击目标是错误分类。
迄今为止最早也是最流行的的对抗攻击是 Fast Gradient Sign Attack, FGSM Explaining and Harnessing Adversarial Examples这种攻击非常强大 也很直观。它旨在利用神经网络的学习方式即梯度来攻击神经网络。这个想法很简单而不是通过基于反向传播梯度调整权重来最小化损失而是基于相同的反向传播梯度来调整输入数据以最大化损失。换句话说攻击使用输入数据的损失梯度然后调整输入数据以最大化损失。 从图中可以看出 xxx 是被正确分类为 panda 的原始图像yyy 是 xxx 的正确标签θ\thetaθ 代表的是模型参数$ J(\theta, x, y)$ 是训练网络的 loss 。攻击反向传播梯度到输入数据计算 ∇xJ(θ,x,y)\nabla_x J(\theta, x, y)∇xJ(θ,x,y) , 然后利用很小的步长 ϵ\epsilonϵ 或 0.007 在某个方向上最大化损失例如 sign(∇xJ(θ,x,y))sign(\nabla_x J(\theta, x, y))sign(∇xJ(θ,x,y)) 最后的扰动图像 x′xx′ 最后被错误分类为 gibbon, 实际上图像还是 panda 。
import torch
import torch.nn as nn
import torch.nn.functional as F
import torch.optim as optim
from torchvision import datasets, transforms
import numpy as np
import matplotlib.pyplot as plt from six.moves import urllib
opener urllib.request.build_opener()
opener.addheaders [(User-agent, Mozilla/5.0)]
urllib.request.install_opener(opener) Implementation
本节中我们将讨论教程的输入参数定义攻击下的模型以及相关的测试
Inputs
三个输入
epsilons: epsilon 列表值保持 0 在列表中非常重要代表着原始模型的性能。 epsilon 越大代表着攻击越大。pretrained_model: 预训练模型训练模型的代码在 这里. 也可以直接下载 预训练模型. 因为 google drive 无法下载所以还可以在 CSDN资源 下载use_cuda: 使用 GPU
Model Under Attack
定义了模型和 DataLoader初始化模型和加载权重。
class Net(nn.Module):def __init__(self):super(Net, self).__init__()self.conv1 nn.Conv2d(1, 32, 3, 1)self.conv2 nn.Conv2d(32, 64, 3, 1)self.dropout1 nn.Dropout(0.25)self.dropout2 nn.Dropout(0.5)self.fc1 nn.Linear(9216, 128)self.fc2 nn.Linear(128, 10)def forward(self, x):x self.conv1(x)x F.relu(x)x self.conv2(x)x F.relu(x)x F.max_pool2d(x, 2)x self.dropout1(x)x torch.flatten(x, 1)x self.fc1(x)x F.relu(x)x self.dropout2(x)x self.fc2(x)output F.log_softmax(x, dim1)return outputepsilons [0, .05, .1, .15, .2, .25, .3]
pretrained_model lenet_mnist_model.pt
use_cuda True# MNIST Test dataset and dataloader declaration
test_loader torch.utils.data.DataLoader(datasets.MNIST(../../../datasets, trainFalse, downloadTrue, transformtransforms.Compose([transforms.ToTensor(),])),batch_size1, shuffleTrue)print(CUDA Available: , torch.cuda.is_available())
device torch.device(cuda if (use_cuda and torch.cuda.is_available()) else cpu)# init network
model Net().to(device)# load the pretrained model
model.load_state_dict(torch.load(pretrained_model, map_locationcpu))# set the model in evaluation mode. In this case this is for the Dropout layers
model.eval()CUDA Available: True
Net((conv1): Conv2d(1, 32, kernel_size(3, 3), stride(1, 1))(conv2): Conv2d(32, 64, kernel_size(3, 3), stride(1, 1))(dropout1): Dropout(p0.25, inplaceFalse)(dropout2): Dropout(p0.5, inplaceFalse)(fc1): Linear(in_features9216, out_features128, biasTrue)(fc2): Linear(in_features128, out_features10, biasTrue)
)FGSM Attack FGSM 攻击
我们现在定义一个函数创建一个对抗实例通过对原始输入进行干扰。 fgsm_attack 函数有3个输入原始输入图像 xxx像素方向扰动量 ϵ\epsilonϵ 梯度损失例如 ∇xJ(θ,x,y)\nabla_x J(\mathbf{\theta}, \mathbf{x}, y)∇xJ(θ,x,y)
创建干扰图像
perturbedimageimageepsilon∗sign(datagrad)xϵ∗sign(∇xJ(θ,x,y))perturbed_imageimageepsilon∗sign(data_grad)xϵ∗sign(∇x J(θ,x,y)) perturbedimageimageepsilon∗sign(datagrad)xϵ∗sign(∇xJ(θ,x,y))
最后为了保持原始图像的数据范围干扰图像被缩放到 [0, 1]
# FGSM attack code
def fgsm_attack(image, epsilon, data_grad):# collect the element-wise sign of the data gradientsign_data_grad data_grad.sign()# create the perturbed image by adjusting each pixel of the input image perturbed_image image epsilon * sign_data_grad # adding clipping to maintain [0, 1] range perturbed_image torch.clamp(perturbed_image, 0, 1)# return the perturbed image return perturbed_imageTesting Function 测试函数
def test(model, device, test_loader, epsilon):# accuracy countercorrect 0adv_examples []# loop over all examples in test set for data, target in test_loader:data, target data.to(device), target.to(device)# Set requires_grad attribute of tensor. Important for Attackdata.requires_grad True# output model(data)init_pred output.max(1, keepdimTrue)[1]# if the initial prediction is wrong, dont botter attacking, just move onif init_pred.item() ! target.item():continue # calculate the lossloss F.nll_loss(output, target)# zero all existing gradmodel.zero_grad()# calculate gradients of model in backward loss loss.backward()# collect datagraddata_grad data.grad.data # call FGSM attackperturbed_data fgsm_attack(data, epsilon, data_grad)# reclassify the perturbed image output model(perturbed_data)# check for success final_pred output.max(1, keepdimTrue)[1]# if final_pred.item() target.item():correct 1# special case for saving 0 epsilon examplesif (epsilon 0) and (len(adv_examples) 5):adv_ex perturbed_data.squeeze().detach().cpu().numpy()adv_examples.append((init_pred.item(), final_pred.item(), adv_ex))else:# Save some adv examples for visualization laterif len(adv_examples) 5:adv_ex perturbed_data.squeeze().detach().cpu().numpy()adv_examples.append( (init_pred.item(), final_pred.item(), adv_ex) )# Calculate final accuracy for this epsilonfinal_acc correct/float(len(test_loader))print(Epsilon: {}\tTest Accuracy {} / {} {}.format(epsilon, correct, len(test_loader), final_acc))# Return the accuracy and an adversarial examplereturn final_acc, adv_examplesRun Attack (执行攻击)
实现的最后一步是执行攻击我们针对每个 epsilon 执行全部的 test step并且保存最终的准确率和一些成功的对抗实例。 ϵ0\epsilon0ϵ0 不执行攻击
accuracies []
examples []# Run test for each epsilon
for eps in epsilons:acc, ex test(model, device, test_loader, eps)accuracies.append(acc)examples.append(ex)Epsilon: 0 Test Accuracy 9906 / 10000 0.9906
Epsilon: 0.05 Test Accuracy 9517 / 10000 0.9517
Epsilon: 0.1 Test Accuracy 8070 / 10000 0.807
Epsilon: 0.15 Test Accuracy 4242 / 10000 0.4242
Epsilon: 0.2 Test Accuracy 1780 / 10000 0.178
Epsilon: 0.25 Test Accuracy 1292 / 10000 0.1292
Epsilon: 0.3 Test Accuracy 1180 / 10000 0.118Accuracy vs Epsilon (正确率 VS epsilon)
ϵ\epsilonϵ 增大时我们期望正确率下降因为大的 ϵ\epsilonϵ 我们在方向上有大的变换可以最大化 loss. 他们的变换不是线性的一开始下降的慢中间下降的快最后下降的慢。
plt.figure(figsize(5, 5))
plt.plot(epsilons, accuracies, *-)
plt.yticks(np.arange(0, 1.1, step0.1))
plt.xticks(np.arange(0, .35, step0.05))
plt.title(Accuracy vs Epsilon)
plt.xlabel(Epsilon)
plt.ylabel(Accuracy)
plt.show()Sample Adversarial Examples (对抗实例)
# Plot several examples of adversarial samples at each epsilon
cnt 0
plt.figure(figsize(8,10))
for i in range(len(epsilons)):for j in range(len(examples[i])):cnt 1plt.subplot(len(epsilons),len(examples[0]),cnt)plt.xticks([], [])plt.yticks([], [])if j 0:plt.ylabel(Eps: {}.format(epsilons[i]), fontsize14)orig,adv,ex examples[i][j]plt.title({} - {}.format(orig, adv))plt.imshow(ex, cmapgray)
plt.tight_layout()
plt.show()完整代码
import torch
import torch.nn as nn
import torch.nn.functional as F
import torch.optim as optim
from torchvision import datasets, transforms
import numpy as np
import matplotlib.pyplot as plt from six.moves import urllib
opener urllib.request.build_opener()
opener.addheaders [(User-agent, Mozilla/5.0)]
urllib.request.install_opener(opener) class Net(nn.Module):def __init__(self):super(Net, self).__init__()self.conv1 nn.Conv2d(1, 32, 3, 1)self.conv2 nn.Conv2d(32, 64, 3, 1)self.dropout1 nn.Dropout(0.25)self.dropout2 nn.Dropout(0.5)self.fc1 nn.Linear(9216, 128)self.fc2 nn.Linear(128, 10)def forward(self, x):x self.conv1(x)x F.relu(x)x self.conv2(x)x F.relu(x)x F.max_pool2d(x, 2)x self.dropout1(x)x torch.flatten(x, 1)x self.fc1(x)x F.relu(x)x self.dropout2(x)x self.fc2(x)output F.log_softmax(x, dim1)return outputepsilons [0, .05, .1, .15, .2, .25, .3]
pretrained_model lenet_mnist_model.pt
use_cuda True# MNIST Test dataset and dataloader declaration
test_loader torch.utils.data.DataLoader(datasets.MNIST(../../../datasets, trainFalse, downloadTrue, transformtransforms.Compose([transforms.ToTensor(),])),batch_size1, shuffleTrue)print(CUDA Available: , torch.cuda.is_available())
device torch.device(cuda if (use_cuda and torch.cuda.is_available()) else cpu)# init network
model Net().to(device)# load the pretrained model
model.load_state_dict(torch.load(pretrained_model, map_locationcpu))# set the model in evaluation mode. In this case this is for the Dropout layers
model.eval()# FGSM attack code
def fgsm_attack(image, epsilon, data_grad):# collect the element-wise sign of the data gradientsign_data_grad data_grad.sign()# create the perturbed image by adjusting each pixel of the input image perturbed_image image epsilon * sign_data_grad # adding clipping to maintain [0, 1] range perturbed_image torch.clamp(perturbed_image, 0, 1)# return the perturbed image return perturbed_imagedef test(model, device, test_loader, epsilon):# accuracy countercorrect 0adv_examples []# loop over all examples in test setfor data, target in test_loader:data, target data.to(device), target.to(device)# Set requires_grad attribute of tensor. Important for Attackdata.requires_grad True#output model(data)init_pred output.max(1, keepdimTrue)[1]# if the initial prediction is wrong, dont botter attacking, just move onif init_pred.item() ! target.item():continue# calculate the lossloss F.nll_loss(output, target)# zero all existing gradmodel.zero_grad()# calculate gradients of model in backward lossloss.backward()# collect datagraddata_grad data.grad.data# call FGSM attackperturbed_data fgsm_attack(data, epsilon, data_grad)# reclassify the perturbed imageoutput model(perturbed_data)# check for successfinal_pred output.max(1, keepdimTrue)[1]#if final_pred.item() target.item():correct 1# special case for saving 0 epsilon examplesif (epsilon 0) and (len(adv_examples) 5):adv_ex perturbed_data.squeeze().detach().cpu().numpy()adv_examples.append((init_pred.item(), final_pred.item(), adv_ex))else:# Save some adv examples for visualization laterif len(adv_examples) 5:adv_ex perturbed_data.squeeze().detach().cpu().numpy()adv_examples.append((init_pred.item(), final_pred.item(), adv_ex))# Calculate final accuracy for this epsilonfinal_acc correct/float(len(test_loader))print(Epsilon: {}\tTest Accuracy {} / {} {}.format(epsilon, correct,len(test_loader), final_acc))# Return the accuracy and an adversarial examplereturn final_acc, adv_examplesaccuracies []
examples []# Run test for each epsilon
for eps in epsilons:acc, ex test(model, device, test_loader, eps)accuracies.append(acc)examples.append(ex)plt.figure(figsize(5, 5))
plt.plot(epsilons, accuracies, *-)
plt.yticks(np.arange(0, 1.1, step0.1))
plt.xticks(np.arange(0, .35, step0.05))
plt.title(Accuracy vs Epsilon)
plt.xlabel(Epsilon)
plt.ylabel(Accuracy)
plt.show()# Plot several examples of adversarial samples at each epsilon
cnt 0
plt.figure(figsize(8, 10))
for i in range(len(epsilons)):for j in range(len(examples[i])):cnt 1plt.subplot(len(epsilons), len(examples[0]), cnt)plt.xticks([], [])plt.yticks([], [])if j 0:plt.ylabel(Eps: {}.format(epsilons[i]), fontsize14)orig, adv, ex examples[i][j]plt.title({} - {}.format(orig, adv))plt.imshow(ex, cmapgray)
plt.tight_layout()
plt.show()
【参考】
ADVERSARIAL EXAMPLE GENERATION