skip to main content
10.1145/2955129.2955178acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmisncConference Proceedingsconference-collections
research-article

Evolutionary generation of adversarial examples for deep and shallow machine learning models

Authors Info & Claims
Published:15 August 2016Publication History

ABSTRACT

Studying vulnerability of machine learning models to adversarial examples is an important way to understand their robustness and generalization properties. In this paper, we propose a genetic algorithm for generating adversarial examples for machine learning models. Such approach is able to find adversarial examples without the access to model's parameters. Different models are tested, including both deep and shallow neural networks architectures. We show that RBF networks and SVMs with RBF kernels tend to be rather robust and not prone to misclassification of adversarial examples.

References

  1. Francois Chollet. Keras. https://github.com/fchollet/keras, 2015.Google ScholarGoogle Scholar
  2. C. Cortes and V. Vapnik. Support-vector networks. Machine Learning, 20(3):273--297, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Girosi, M. Jones, and T. Poggio. Regularization theory and Neural Networks architectures. Neural Computation, 2:219--269, 7 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples, 2014. arXiv:1412.6572.Google ScholarGoogle Scholar
  5. Yoshua Bengio Ian Goodfellow and Aaron Courville. Deep learning. Book in preparation for MIT Press, 2016.Google ScholarGoogle Scholar
  6. Yann LeCun and Corinna Cortes. The mnist database of handwritten digits, 2012.Google ScholarGoogle Scholar
  7. M. Mitchell. An Introduction to Genetic Algorithms. MIT Press, Cambridge, MA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Moody and C. Darken. Fast learning in networks of locally-tuned processing units. Neural Computation, 1:289--303, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Neruda and P. Kudová. Learning methods for radial basis functions networks. Future Generation Computer Systems, 21:1131--1142, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Anh Mai Nguyen, Jason Yosinski, and Jeff Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. CoRR, abs/1412.1897, 2014.Google ScholarGoogle Scholar
  11. F. Pedregosa et al. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825--2830, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks, 2013. arXiv:1312.6199.Google ScholarGoogle Scholar
  13. V. N. Vapnik. Statistical Learning Theory. Wiley, New-York, 1998.Google ScholarGoogle Scholar
  14. J. P. Vert, K. Tsuda, and B. Scholkopf. A primer on kernel methods. Kernel Methods in Computational Biology, pages 35--70, 2004.Google ScholarGoogle Scholar
  1. Evolutionary generation of adversarial examples for deep and shallow machine learning models

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MISNC, SI, DS 2016: Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016
      August 2016
      371 pages
      ISBN:9781450341295
      DOI:10.1145/2955129

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 August 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      MISNC, SI, DS 2016 Paper Acceptance Rate57of97submissions,59%Overall Acceptance Rate57of97submissions,59%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader