-
Black-box Attacks on Image Activity Prediction and its Natural Language Explanations
Authors:
Alina Elena Baia,
Valentina Poggioni,
Andrea Cavallaro
Abstract:
Explainable AI (XAI) methods aim to describe the decision process of deep neural networks. Early XAI methods produced visual explanations, whereas more recent techniques generate multimodal explanations that include textual information and visual representations. Visual XAI methods have been shown to be vulnerable to white-box and gray-box adversarial attacks, with an attacker having full or parti…
▽ More
Explainable AI (XAI) methods aim to describe the decision process of deep neural networks. Early XAI methods produced visual explanations, whereas more recent techniques generate multimodal explanations that include textual information and visual representations. Visual XAI methods have been shown to be vulnerable to white-box and gray-box adversarial attacks, with an attacker having full or partial knowledge of and access to the target system. As the vulnerabilities of multimodal XAI models have not been examined, in this paper we assess for the first time the robustness to black-box attacks of the natural language explanations generated by a self-rationalizing image-based activity recognition model. We generate unrestricted, spatially variant perturbations that disrupt the association between the predictions and the corresponding explanations to mislead the model into generating unfaithful explanations. We show that we can create adversarial images that manipulate the explanations of an activity recognition model by having access only to its final output.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
Smart caching in a Data Lake for High Energy Physics analysis
Authors:
Tommaso Tedeschi,
Diego Ciangottini,
Marco Baioletti,
Valentina Poggioni,
Daniele Spiga,
Loriano Storchi,
Mirco Tracolli
Abstract:
The continuous growth of data production in almost all scientific areas raises new problems in data access and management, especially in a scenario where the end-users, as well as the resources that they can access, are worldwide distributed. This work is focused on the data caching management in a Data Lake infrastructure in the context of the High Energy Physics field. We are proposing an autono…
▽ More
The continuous growth of data production in almost all scientific areas raises new problems in data access and management, especially in a scenario where the end-users, as well as the resources that they can access, are worldwide distributed. This work is focused on the data caching management in a Data Lake infrastructure in the context of the High Energy Physics field. We are proposing an autonomous method, based on Reinforcement Learning techniques, to improve the user experience and to contain the maintenance costs of the infrastructure.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Effective Universal Unrestricted Adversarial Attacks using a MOE Approach
Authors:
A. E. Baia,
G. Di Bari,
V. Poggioni
Abstract:
Recent studies have shown that Deep Leaning models are susceptible to adversarial examples, which are data, in general images, intentionally modified to fool a machine learning classifier. In this paper, we present a multi-objective nested evolutionary algorithm to generate universal unrestricted adversarial examples in a black-box scenario. The unrestricted attacks are performed through the appli…
▽ More
Recent studies have shown that Deep Leaning models are susceptible to adversarial examples, which are data, in general images, intentionally modified to fool a machine learning classifier. In this paper, we present a multi-objective nested evolutionary algorithm to generate universal unrestricted adversarial examples in a black-box scenario. The unrestricted attacks are performed through the application of well-known image filters that are available in several image processing libraries, modern cameras, and mobile applications. The multi-objective optimization takes into account not only the attack success rate but also the detection rate. Experimental results showed that this approach is able to create a sequence of filters capable of generating very effective and undetectable attacks.
△ Less
Submitted 27 February, 2021;
originally announced March 2021.
-
Encouraging early mastery of computational concepts through play
Authors:
Hannah M. Dee,
Jordi Freixenet,
Xavier Cufi,
Eduard Muntaner Perich,
Valentina Poggioni,
Marius Marian,
Alfredo Milani
Abstract:
Learning to code, and more broadly, learning about computer science is a growing field of activity and research. Under the label of computational thinking, computational concepts are increasingly used as cognitive tools in many subject areas, beyond computer science. Using playful approaches and gamification to motivate educational activities, and to encourage exploratory learning is not a new ide…
▽ More
Learning to code, and more broadly, learning about computer science is a growing field of activity and research. Under the label of computational thinking, computational concepts are increasingly used as cognitive tools in many subject areas, beyond computer science. Using playful approaches and gamification to motivate educational activities, and to encourage exploratory learning is not a new idea since play has been involved in the learning of computational concepts by children from the very start. There is a tension however, between learning activities and opportunities that are completely open and playful, and learning activities that are structured enough to be easily replicable among contexts, countries and classrooms. This paper describes the conception, refinement, design and evaluation of a set of playful computational activities for classrooms or code clubs, that balance the benefits of playfulness with sufficient rigor and structure to enable robust replication.
△ Less
Submitted 8 May, 2020;
originally announced May 2020.