Results 1-20 of 64.
((uid:50002201))
![]() Chitic, Ioana Raluca ![]() ![]() ![]() in Applied Sciences (2023), 13(6), 4068 Recently, convolutional neural networks (CNNs) have become the main drivers in many image recognition applications. However, they are vulnerable to adversarial attacks, which can lead to disastrous ... [more ▼] Recently, convolutional neural networks (CNNs) have become the main drivers in many image recognition applications. However, they are vulnerable to adversarial attacks, which can lead to disastrous consequences. This paper introduces ShuffleDetect as a new and efficient unsupervised method for the detection of adversarial images against trained convolutional neural networks. Its main feature is to split an input image into non-overlapping patches, then swap the patches according to permutations, and count the number of permutations for which the CNN classifies the unshuffled input image and the shuffled image into different categories. The image is declared adversarial if and only if the proportion of such permutations exceeds a certain threshold value. A series of 8 targeted or untargeted attacks was applied on 10 diverse and state-of-the-art ImageNet-trained CNNs, leading to 9500 relevant clean and adversarial images. We assessed the performance of ShuffleDetect intrinsically and compared it with another detector. Experiments show that ShuffleDetect is an easy-to-implement, very fast, and near memory-free detector that achieves high detection rates and low false positive rates. [less ▲] Detailed reference viewed: 31 (1 UL)![]() Leprevost, Franck ![]() ![]() ![]() in ACIIDS 2022: Intelligent Information and Database Systems (2022) Detailed reference viewed: 64 (8 UL)![]() Leprevost, Franck ![]() ![]() in Journal of Information and Telecommunication (2022), 7(1), 89-119 To perform image recognition, Convolutional Neural Networks (CNNs) assess any image by first resizing it to its input size. In particular, high-resolution images are scaled down, say to 224×244 for CNNs ... [more ▼] To perform image recognition, Convolutional Neural Networks (CNNs) assess any image by first resizing it to its input size. In particular, high-resolution images are scaled down, say to 224×244 for CNNs trained on ImageNet. So far, existing attacks, aiming at creating an adversarial image that a CNN would misclassify while a human would not notice any difference between the modified and unmodified images, proceed by creating adversarial noise in the 224×244 resized domain and not in the high-resolution domain. The complexity of directly attacking high-resolution images leads to challenges in terms of speed, adversity and visual quality, making these attacks infeasible in practice. We design an indirect attack strategy that lifts to the high-resolution domain any existing attack that works efficiently in the CNN's input size domain. Adversarial noise created via this method is of the same size as the original image. We apply this approach to 10 state-of-the-art CNNs trained on ImageNet, with an evolutionary algorithm-based attack. Our method succeeded in 900 out of 1000 trials to create such adversarial images, that CNNs classify with probability ≥0.55 in the adversarial category. Our indirect attack is the first effective method at creating adversarial images in the high-resolution domain. [less ▲] Detailed reference viewed: 35 (1 UL)![]() ; Topal, Ali Osman ![]() ![]() in Applied Sciences (2022), 12(14), 7339 Detailed reference viewed: 41 (10 UL)![]() Chitic, Ioana Raluca ![]() ![]() ![]() in IEEE Access (2021) Detailed reference viewed: 82 (8 UL)![]() Chitic, Ioana Raluca ![]() ![]() in Optimization and Learning (2021), 1443 Detailed reference viewed: 88 (7 UL)![]() ![]() Leprevost, Franck ![]() Article for general public (2021) Detailed reference viewed: 108 (3 UL)![]() Leprevost, Franck ![]() Book published by ISTE and Wiley (2021) Since the publication of the first Shanghai ranking in 2003, the international rankings of universities have become evermore important. This book examines the evolution of higher education systems and the ... [more ▼] Since the publication of the first Shanghai ranking in 2003, the international rankings of universities have become evermore important. This book examines the evolution of higher education systems and the role of universities in contemporary societies, which are marked by increased competition and tensions. Investigating whether the dynamism of universities is an accurate indicator of the intellectual life of their civilizations, Universities and Civilizations systematically analyzes the evolution of universities in several main rankings, from their creation until now. [less ▲] Detailed reference viewed: 117 (6 UL)![]() ; ; et al in Voevodin, Vladimir; Sobolev, Sergey (Eds.) 6th Russian Supercomputing Days, Moscow 21-22 September 2020 (2020, December) Detailed reference viewed: 104 (1 UL)![]() Chitic, Ioana Raluca ![]() ![]() in Journal of Information and Telecommunication (2020) The range of applications of Neural Networks encompasses image classification. However, Neural Networks are vulnerable to attacks, and may misclassify adversarial images, leading to potentially disastrous ... [more ▼] The range of applications of Neural Networks encompasses image classification. However, Neural Networks are vulnerable to attacks, and may misclassify adversarial images, leading to potentially disastrous consequences. Pursuing some of our previous work, we provide an extended proof of concept of a black-box, targeted, non-parametric attack using evolutionary algorithms to fool both Neural Networks and humans at the task of image classification. Our feasibility study is performed on VGG-16 trained on CIFAR-10. For any category cA of CIFAR-10, one chooses an image A classified by VGG-16 as belonging to cA. From there, two scenarios are addressed. In the first scenario, a target category ct≠cA is fixed a priori. We construct an evolutionary algorithm that evolves A to a modified image that VGG-16 classifies as belonging to ct. In the second scenario, we construct another evolutionary algorithm that evolves A to a modified image that VGG-16 is unable to classify. In both scenarios, the obtained adversarial images remain so close to the original one that a human would likely classify them as still belonging to cA. [less ▲] Detailed reference viewed: 254 (9 UL)![]() Leprevost, Franck ![]() Book published by Amazon (2020) Detailed reference viewed: 134 (18 UL)![]() Chitic, Raluca Ioana ![]() ![]() in Chitic, Iona Raluca; Bernard, Nicolas; Leprévost, Franck (Eds.) Proceedings of ACIIDS 2020 (2020) Detailed reference viewed: 94 (12 UL)![]() Thanapol, Panissara ![]() ![]() in 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (2020) Detailed reference viewed: 112 (11 UL)![]() Bernard, Nicolas ![]() ![]() in Theeramunkong, Thanaruk; Bouvry, Pascal; Srichaikul, Piyawut (Eds.) Proceedings of the OLA'2019 International Conference on Optimization and Learning (Bangkok, Thailand, Jan 29-31, 2019) (2019) Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful ... [more ▼] Deep Neural Networks are used for a wide range of critical applications, notably for image recognition. The ability to deceive their recognition abilities is an active research domain, since successful deceptions may have disastrous consequences. Still, humans sometimes detect mistakes made by machines when they classify images. One can conceive a system able to solicit humans in case of doubts, namely when humans and machines may disagree. Using Information Hiding techniques, we describe a strategy to construct evolutionary algorithms able to fool both neural networks and humans for image recognition. Although this research is still exploratory, we already describe a concrete fitness function for a specific scenario. Additional scenarii and further research directions are provided. [less ▲] Detailed reference viewed: 90 (1 UL)![]() Leprévost, Franck ![]() in Altbach, Phil; Reisberg, Liz; Salmi, Jamil (Eds.) et al Accelerated Universities: A ideas and Money Combine to Build Academic Excellence (2018) Detailed reference viewed: 88 (5 UL)![]() Leprévost, Franck ![]() in Proceedings of the 3rd International Conference on Applications in Information Technology (2018) This conference presents in a non-conventional way secret-key and public-key cryptology from its origins to the present days. Detailed reference viewed: 126 (5 UL)![]() Bernard, Nicolas ![]() ![]() in Meneses, Esteban; Castro, Harold; Barrios Hernández, Carlos Jaime (Eds.) et al High Performance Computing -- 5th Latin American Conference, CARLA 2018, Piedecuesta, Colombia (2018) Deep Learning is based on deep neural networks trained over huge sets of examples. It enabled computers to compete with ---~or even outperform~--- humans at many tasks, from playing Go to driving ... [more ▼] Deep Learning is based on deep neural networks trained over huge sets of examples. It enabled computers to compete with ---~or even outperform~--- humans at many tasks, from playing Go to driving vehicules. Still, it remains hard to understand how these networks actually operate. While an observer sees any individual local behaviour, he gets little insight about their global decision-making process. However, there is a class of neural networks widely used for image processing, convolutional networks, where each layer contains features working in parallel. By their structure, these features keep some spatial information across a network's layers. Visualisation of this spatial information at different locations in a network, notably on input data that maximise the activation of a given feature, can give insights on the way the model works. This paper investigates the use of Evolutionary Algorithms to evolve such input images that maximise feature activation. Compared with some pre-existing approaches, ours seems currently computationally heavier but with a wider applicability. [less ▲] Detailed reference viewed: 92 (6 UL)![]() Leprévost, Franck ![]() ![]() ![]() in Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018) (2018) These notes summarize some computations conducted around the Elliptic Curves Discrete Logarithm Problem (ECDLP) over a finite field Fp. Detailed reference viewed: 128 (2 UL)![]() Bernard, Nicolas ![]() ![]() in Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica (2013), 12(4), 11-22 Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if not, to add e to S. They do not store any data and only provide boolean answers regarding the membership ... [more ▼] Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if not, to add e to S. They do not store any data and only provide boolean answers regarding the membership of a given element in the set, with some probability of false positive answers. Bloom filters are often used in caching system to check that some requested data actually exist before doing a costly lookup to retrieve them. However, security issues may arise for some other applications where an active attacker is able to inject data crafted to degrade the filters’ algorithmic properties, resulting for instance in a Denial of Service (DoS) situation. This leads us to the concept of hardened Bloom filters, combining classical Bloom filters with cryptographic hash functions and secret nonces. We show how this approach is successfully used in the TrueNyms unobservability system and protects it against replay attacks. [less ▲] Detailed reference viewed: 204 (20 UL)![]() Bernard, Nicolas ![]() ![]() in Security and Intelligent Information Systems (2012) Detailed reference viewed: 1297 (34 UL) |
||