Towards understanding limitations of pixel discretization against adversarial attacks

10Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.

Abstract

Wide adoption of artificial neural networks in various domains has led to an increasing interest in defending adversarial attacks against them. Preprocessing defense methods such as pixel discretization are particularly attractive in practice due to their simplicity, low computational overhead, and applicability to various systems. It is observed that such methods work well on simple datasets like MNIST, but break on more complicated ones like ImageNet under recently proposed strong white-box attacks. To understand the conditions for success and potentials for improvement, we study the pixel discretization defense method, including more sophisticated variants that take into account the properties of the dataset being discretized. Our results again show poor resistance against the strong attacks. We analyze our results in a theoretical framework and offer strong evidence that pixel discretization is unlikely to work on all but the simplest of the datasets. Furthermore, our arguments present insights why some other preprocessing defenses may be insecure.

Cite

CITATION STYLE

APA

Chen, J., Wu, X., Rastogi, V., Liang, Y., & Jha, S. (2019). Towards understanding limitations of pixel discretization against adversarial attacks. In Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (pp. 480–495). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/EuroSP.2019.00042

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free