Skip to main content

Showing 1–12 of 12 results for author: Rozsa, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.08443  [pdf, other

    cs.CV

    Adversarial Attack on Deep Learning-Based Splice Localization

    Authors: Andras Rozsa, Zheng Zhong, Terrance E. Boult

    Abstract: Regarding image forensics, researchers have proposed various approaches to detect and/or localize manipulations, such as splices. Recent best performing image-forensics algorithms greatly benefit from the application of deep learning, but such tools can be vulnerable to adversarial attacks. Due to the fact that most of the proposed adversarial example generation techniques can be used only on end-… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: This is a pre-print of the original paper accepted at the CVPR Workshop on Media Forensics 2020

  2. arXiv:1908.02435  [pdf, other

    cs.CV cs.LG

    Improved Adversarial Robustness by Reducing Open Space Risk via Tent Activations

    Authors: Andras Rozsa, Terrance E. Boult

    Abstract: Adversarial examples contain small perturbations that can remain imperceptible to human observers but alter the behavior of even the best performing deep learning models and yield incorrect outputs. Since their discovery, adversarial examples have drawn significant attention in machine learning: researchers try to reveal the reasons for their existence and improve the robustness of machine learnin… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  3. Facial Attributes: Accuracy and Adversarial Robustness

    Authors: Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

    Abstract: Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. While recent methods extract facial attributes using deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute representations has not been evaluated. In this paper, we examine the representational stability… ▽ More

    Submitted 20 April, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

    Comments: arXiv admin note: text overlap with arXiv:1605.05411

    Journal ref: Pattern Recognition Letters, 2017, ISSN 0167-8655

  4. arXiv:1708.01697  [pdf, other

    cs.CV

    Adversarial Robustness: Softmax versus Openmax

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Deep neural networks (DNNs) provide state-of-the-art results on various tasks and are widely used in real world applications. However, it was discovered that machine learning models, including the best performing DNNs, suffer from a fundamental problem: they can unexpectedly and confidently misclassify examples formed by slightly perturbing otherwise correctly recognized inputs. Various approaches… ▽ More

    Submitted 4 August, 2017; originally announced August 2017.

    Comments: Accepted to British Machine Vision Conference (BMVC) 2017

  5. arXiv:1612.00138  [pdf, other

    cs.CV

    Towards Robust Deep Neural Networks with BANG

    Authors: Andras Rozsa, Manuel Gunther, Terrance E. Boult

    Abstract: Machine learning models, including state-of-the-art deep neural networks, are vulnerable to small perturbations that cause unexpected classification errors. This unexpected lack of robustness raises fundamental questions about their generalization properties and poses a serious concern for practical deployments. As such perturbations can remain imperceptible - the formed adversarial examples demon… ▽ More

    Submitted 30 January, 2018; v1 submitted 30 November, 2016; originally announced December 2016.

    Comments: Accepted to the IEEE Winter Conference on Applications of Computer Vision (WACV), 2018

  6. arXiv:1611.06179  [pdf, other

    cs.CV

    LOTS about Attacking Deep Features

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Deep neural networks provide state-of-the-art performance on various tasks and are, therefore, widely used in real world applications. DNNs are becoming frequently utilized in biometrics for extracting deep features, which can be used in recognition systems for enrolling and recognizing new individuals. It was revealed that deep neural networks suffer from a fundamental problem, namely, they can u… ▽ More

    Submitted 31 May, 2018; v1 submitted 18 November, 2016; originally announced November 2016.

    Comments: Accepted to the International Joint Conference on Biometrics (IJCB) 2017

  7. arXiv:1611.06158  [pdf, other

    cs.CV

    AFFACT - Alignment-Free Facial Attribute Classification Technique

    Authors: Manuel Günther, Andras Rozsa, Terrance E. Boult

    Abstract: Facial attributes are soft-biometrics that allow limiting the search space, e.g., by rejecting identities with non-matching facial characteristics such as nose sizes or eyebrow shapes. In this paper, we investigate how the latest versions of deep convolutional neural networks, ResNets, perform on the facial attribute classification task. We test two loss functions: the sigmoid cross-entropy loss a… ▽ More

    Submitted 4 August, 2017; v1 submitted 18 November, 2016; originally announced November 2016.

    Comments: This is a pre-print of the original paper accepted for oral presentation at the International Joint Conference on Biometrics (IJCB) 2017

  8. Are Accuracy and Robustness Correlated?

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Machine learning models are vulnerable to adversarial examples formed by applying small carefully chosen perturbations to inputs that cause unexpected classification errors. In this paper, we perform experiments on various adversarial example generation approaches with multiple deep convolutional neural networks including Residual Networks, the best performing models on ImageNet Large-Scale Visual… ▽ More

    Submitted 30 November, 2016; v1 submitted 14 October, 2016; originally announced October 2016.

    Comments: Accepted for publication at ICMLA 2016

  9. arXiv:1610.04256  [pdf, other

    cs.CV

    Assessing Threat of Adversarial Examples on Deep Neural Networks

    Authors: Abigail Graese, Andras Rozsa, Terrance E. Boult

    Abstract: Deep neural networks are facing a potential security threat from adversarial examples, inputs that look normal but cause an incorrect classification by the deep neural network. For example, the proposed threat could result in hand-written digits on a scanned check being incorrectly classified but looking normal when humans see them. This research assesses the extent to which adversarial examples p… ▽ More

    Submitted 13 October, 2016; originally announced October 2016.

    Comments: This is a pre-print version to appear in IEEE ICMLA 2016

  10. arXiv:1605.05411  [pdf, other

    cs.CV

    Are Facial Attributes Adversarially Robust?

    Authors: Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

    Abstract: Facial attributes are emerging soft biometrics that have the potential to reject non-matches, for example, based on mismatching gender. To be usable in stand-alone systems, facial attributes must be extracted from images automatically and reliably. In this paper, we propose a simple yet effective solution for automatic facial attribute extraction by training a deep convolutional neural network (DC… ▽ More

    Submitted 16 September, 2016; v1 submitted 17 May, 2016; originally announced May 2016.

    Comments: Pre-print of article accepted to the International Conference on Pattern Recognition (ICPR) 2016. 7 pages total

  11. arXiv:1605.01775  [pdf, other

    cs.CV

    Adversarial Diversity and Hard Positive Generation

    Authors: Andras Rozsa, Ethan M. Rudd, Terrance E. Boult

    Abstract: State-of-the-art deep neural networks suffer from a fundamental problem - they misclassify adversarial examples formed by applying small perturbations to inputs. In this paper, we present a new psychometric perceptual adversarial similarity score (PASS) measure for quantifying adversarial images, introduce the notion of hard positive generation, and use a diverse set of adversarial perturbations -… ▽ More

    Submitted 16 May, 2016; v1 submitted 5 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 DeepVision Workshop

  12. arXiv:1603.06028  [pdf, other

    cs.CR cs.CV

    A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

    Authors: Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild fo… ▽ More

    Submitted 2 December, 2016; v1 submitted 18 March, 2016; originally announced March 2016.

    Comments: Pre-Print of a manuscript Accepted to IEEE Communications Surveys and Tutorials (COMST) on December 1, 2016