56 research outputs found

    Breaking the Black-Box: Confidence-Guided Model Inversion Attack for Distribution Shift

    Full text link
    Model inversion attacks (MIAs) seek to infer the private training data of a target classifier by generating synthetic images that reflect the characteristics of the target class through querying the model. However, prior studies have relied on full access to the target model, which is not practical in real-world scenarios. Additionally, existing black-box MIAs assume that the image prior and target model follow the same distribution. However, when confronted with diverse data distribution settings, these methods may result in suboptimal performance in conducting attacks. To address these limitations, this paper proposes a \textbf{C}onfidence-\textbf{G}uided \textbf{M}odel \textbf{I}nversion attack method called CG-MI, which utilizes the latent space of a pre-trained publicly available generative adversarial network (GAN) as prior information and gradient-free optimizer, enabling high-resolution MIAs across different data distributions in a black-box setting. Our experiments demonstrate that our method significantly \textbf{outperforms the SOTA black-box MIA by more than 49\% for Celeba and 58\% for Facescrub in different distribution settings}. Furthermore, our method exhibits the ability to generate high-quality images \textbf{comparable to those produced by white-box attacks}. Our method provides a practical and effective solution for black-box model inversion attacks.Comment: 8pages,5 figure

    A deep learning approach to predict collateral flow in stroke patients using radiomic features from perfusion images.

    Get PDF
    Collateral circulation results from specialized anastomotic channels which are capable of providing oxygenated blood to regions with compromised blood flow caused by arterial obstruction. The quality of collateral circulation has been established as a key factor in determining the likelihood of a favorable clinical outcome and goes a long way to determining the choice of a stroke care model. Though many imaging and grading methods exist for quantifying collateral blood flow, the actual grading is mostly done through manual inspection. This approach is associated with a number of challenges. First, it is time-consuming. Second, there is a high tendency for bias and inconsistency in the final grade assigned to a patient depending on the experience level of the clinician. We present a multi-stage deep learning approach to predict collateral flow grading in stroke patients based on radiomic features extracted from MR perfusion data. First, we formulate a region of interest detection task as a reinforcement learning problem and train a deep learning network to automatically detect the occluded region within the 3D MR perfusion volumes. Second, we extract radiomic features from the obtained region of interest through local image descriptors and denoising auto-encoders. Finally, we apply a convolutional neural network and other machine learning classifiers to the extracted radiomic features to automatically predict the collateral flow grading of the given patient volume as one of three severity classes - no flow (0), moderate flow (1), and good flow (2). Results from our experiments show an overall accuracy of 72% in the three-class prediction task. With an inter-observer agreement of 16% and a maximum intra-observer agreement of 74% in a similar experiment, our automated deep learning approach demonstrates a performance comparable to expert grading, is faster than visual inspection, and eliminates the problem of grading bias

    Autonomous science for an ExoMars Rover-like mission

    Get PDF
    In common with other Mars exploration missions, human supervision of Europe's ExoMars Rover will be mostly indirect via orbital relay spacecraft and thus far from immediate. The gap between issuing commands and witnessing the results of the consequent rover actions will typically be on the order of several hours or even sols. In addition, it will not be possible to observe the external environment at the time of action execution. This lengthens the time required to carry out scientific exploration and limits the mission's ability to respond quickly to favorable science events. To increase potential science return for such missions, it will be necessary to deploy autonomous systems that include science target selection and active data acquisition. In this work, we have developed and integrated technologies that we explored in previous studies and used the resulting test bed to demonstrate an autonomous, opportunistic science concept on a representative robotic platform. In addition to progressing the system design approach and individual autonomy components, we have introduced a methodology for autonomous science assessment based on terrestrial field science practice

    Recessive Social Networking:Preventing Privacy Leakage against Reverse Image Search

    Get PDF
    This work investigates the image privacy problem in the context of social networking under the threat of reverse image search. We introduce a new concept called recessive social networking. Unlike conventional privacy-preserving social networking, in our setting, the aim is to deceive machine learning algorithms that used in reverse image search, while still enabling unaffected ubiquitous social networking among humans. We, for the first time, ultilize adversarial example technique as a defensive mechanism to protect image privacy against content-based image search algorithms in the context of social networking. Finally, rigorous evaluations are conducted to demonstrate the effectiveness, transferability, and robustness of the proposed countermeasure

    End-to-end learning, and audio-visual human-centric video understanding

    Get PDF
    The field of machine learning has seen tremendous progress in the last decade, largely due to the advent of deep neural networks. When trained on large-scale labelled datasets, these machine learning algorithms can learn powerful semantic representations directly from the input data, end-to-end. End-to-end learning requires the availability of three core components: useful input data, target outputs, and an objective function for measuring how well the model's predictions match the target outputs. In this thesis, we explore and overcome a series of challenges as related to assembling these three components in the sufficient format and scale for end-to-end learning. The first key idea presented in this thesis is to learn representations by enabling end-to-end learning for tasks where such challenges exist. We first explore whether better representations can be learnt for the image retrieval task by directly optimising the evaluation metric, Average Precision. This is notoriously challenging task, because such rank-based metrics are non-differentiable. We introduce a simple objective function that optimises a smoothed approximation of Average Precision, termed Smooth-AP, and demonstrate the benefits of training end-to-end over prior approaches. Secondly, we explore whether a representation can be learnt end-to-end for the task of image editing, where target data does not exist in sufficient scale. We propose a self-supervised approach that simulates target data by augmenting off-the-shelf image data, giving remarkable benefits over prior work. The second idea presented in this thesis is focused on how to use the rich multi-modal signals that are essential for human perceptual systems as input data for deep neural networks. More specifically, we explore the use of audio-visual input data for the human-centric video understanding task. Here, we first explore if highly optimised speaker verification representations can transfer to the domain of movies where humans intentionally disguise their voice. We do this by collecting an audio-visual dataset of humans speaking in movies. Second, given strong identity discriminating representations, we present two methods that harness the complementarity and redundancy between multi-modal signals in order to build robust perceptual systems for determining who is present in a scene. These methods include an automated pipeline for labelling people in unlabelled video archives, and an approach for clustering people by identity in videos

    Machine learning and image processing

    Get PDF
    Dissertaรงรฃo de mestrado em Matemรกtica e ComputaรงรฃoPortuguese legislation states the compulsory reporting of the addition of amenities, such as swimming pools, to the Portuguese tax authority. The purpose is to update the property tax value, to be charged annually to the owner of each real estate. According to Technavio and Market- Watch, this decade will bring a global rise to the number of swimming pools due to certain factors such as: cost reduction, increasing health consciousness, and others. The need for inspections to ensure that all new constructions are communicated to the competent authorities is therefore rapidly increasing and new solutions are needed to address this problem. Typically, supervision is done by sending human resources to the field, involving huge time and resource consumption, and preventing the catalogue from updating at a rate close to the speed of construction. Automation is rapidly becoming an absolute requirement to improve task efficiency and affordability. Recently, Deep Learning algorithms have shown incredible performance results when used for object detection tasks. Based on the above, the objective of this thesis is to study the various existing object detection algorithms and implement a Deep Learning model capable of recognising swimming pools from satellite images. To achieve the best results for this specific task, the RetinaNet algorithm was chosen. To provide a smooth user experience with the developed model, a simple graphical user interface was also created.A legislaรงรฃo Portuguesa declara a obrigatoriedade da comunicaรงรฃo de novas construรงรตes, como piscinas, ร  Autoridade Tributรกria e Aduaneira. Esta comuniรงรฃo permite o ajustamento do Imposto Municipal sobre Imรณveis a pagar anualmente pelo proprietรกrio. De acordo com o Technavio e o MarketWatch, irรก ocorrer um aumento significativo do nรบmero de piscinas devido a vรกrios fatores como a reduรงรฃo do custo da construรงรฃo, o aumento da consciรชncia para a adoรงรฃo de um estilo de vida saudรกvel, entre outros. Isto leva ร  necessidade de um reforรงo na inspeรงรฃo de forma a garantir que todas as novas construรงรตes foram devidamente comunicadas ร  autoridade competente. Atualmente, estas inspeรงรตes sรฃo realizadas com a distribuiรงรฃo de recursos humanos pelo terreno, o que trรกz um elevado custo operacional e temporal, impedindo uma catalogaรงรฃo a uma taxa prรณxima da de construรงรฃo. Hoje em dia, a automataรงรฃo de tarefas estรก a tornar-se muito requisitada devido a permitir o aumento da eficiรชncia e a reduรงรฃo de custos. Recentemente, os algoritmos de Deep Learning tem demonstrado resultados incriveis quando usados para deteรงรฃo de objetos. O objetivo desta dissertaรงรฃo รฉ o estudo dos vรกrios algoritmos de deteรงรฃo de objetos existentes e a implementaรงรฃo de um modelo de Deep Learning capaz de detetar piscinas em imagens satรฉlite. De forma a obter os melhores resultados na tarefa em questรฃo, o algoritmo RetinaNet foi usado. Alรฉm disso e com o intuito de melhorar a experiรชncia na utilizaรงรฃo do modelo desenvolvido, foi construรญda uma interface grรกfica simples

    ์†์‹คํ•จ์ˆ˜ ํƒ์ƒ‰์„ ํ†ตํ•œ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ๊ฐ•๊ฑด์„ฑ๊ณผ ์ผ๋ฐ˜ํ™” ํ–ฅ์ƒ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์‚ฐ์—…๊ณตํ•™๊ณผ, 2023. 2. ์ด์žฌ์šฑ.๋”ฅ๋Ÿฌ๋‹์€ ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ๋›ฐ์–ด๋‚œ ์„ฑ๋Šฅํ–ฅ์ƒ์„ ๋ณด์ด๋ฉฐ, ์Œ์„ฑ ์ธ์‹, ์ž์œจ์ฃผํ–‰ ๋ฐ ์˜๋ฃŒ ์‚ฐ์—… ๋“ฑ ๋งŽ์€ ๋ถ„์•ผ์— ํ™œ์šฉ๋˜๊ณ  ์žˆ๋‹ค. ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์€ ์ˆ˜๋งŽ์€ ๊ฐ€์ค‘์น˜๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ, ์ฃผ์–ด์ง„ ํ•™์Šต ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์†์‹คํ•จ์ˆ˜๋ฅผ ์ค„์ด๋„๋ก ํ•™์Šต๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ์ตœ๊ทผ ํ•™์Šต ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ๋งน๋ชฉ์ ์ธ ์†์‹คํ•จ์ˆ˜์˜ ์ตœ์†Œํ™”๋Š” ํฌ๊ฒŒ ๋‘ ๊ฐ€์ง€์˜ ๋…ผ์˜์ ์ด ์žˆ์Œ์ด ๋ฐํ˜€์กŒ๋‹ค. ์ฒซ ๋ฒˆ์งธ ๋…ผ์˜์ ์€ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ๊ฐ•๊ฑด์„ฑ์ด๋‹ค. ๊ฐ•๊ฑด์„ฑ์ด๋ž€ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์ ๋Œ€์  ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋ฐฉ์–ด ๋Šฅ๋ ฅ์„ ๋งํ•œ๋‹ค. ์ ๋Œ€์  ๊ณต๊ฒฉ์€ ํ•™์Šต๋œ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ๊ฐ€์ค‘์น˜์™€ ๊ธฐ ์šธ๊ธฐ ์ •๋ณด ๋“ฑ์„ ํ™œ์šฉํ•˜์—ฌ ๋น„์ •์ƒ์ ์ธ ๋ฐ์ดํ„ฐ๋ฅผ ๋งŒ๋“ค์–ด๋‚ด๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ, ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์„ฑ๋Šฅ์„ ํ˜„์ €ํ•˜๊ฒŒ ์ €ํ•˜์‹œํ‚จ๋‹ค. ํ˜„์žฌ๊นŒ์ง€ ๋ฐํ˜€์ง„ ๋ฐ”๋กœ๋Š” ์•„์ฃผ ์ž‘์€ ํฌ๊ธฐ์˜ ์„ญ๋™๋„ ๋น„์ •์ƒ ๋ฐ์ดํ„ฐ๋ฅผ ์ƒ์„ฑํ•˜๊ธฐ์— ์ถฉ๋ถ„ํ•˜์—ฌ, ์‚ฌ๋žŒ์—๊ฒŒ๋Š” ์ •์ƒ ๋ฐ์ดํ„ฐ๋กœ ์ธ์‹๋˜๋‚˜ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์€ ์น˜ ๋ช…์ ์œผ๋กœ ์˜ค์ž‘๋™ํ•˜๋Š” ์ ๋Œ€์  ์˜ˆ์ œ๋ฅผ ์‰ฝ๊ฒŒ ๋งŒ๋“ค ์ˆ˜ ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์•ˆ์ „ํ•œ ์ƒ์šฉํ™”๋ฅผ ์œ„ํ•ด ๊ฐ•๊ฑด์„ฑ์€ ํ•„์ˆ˜์ ์œผ๋กœ ์—ฐ๊ตฌ๋˜์–ด์•ผ ํ•  ์š”์†Œ์ด๋‹ค. ๋‘ ๋ฒˆ์งธ ๋…ผ์˜์ ์€ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์ผ๋ฐ˜ํ™”์ด๋‹ค. ์ผ๋ฐ˜ํ™”๋ž€ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ํ•™์Šต ๋ฐ์ดํ„ฐ ์— ๋Œ€ํ•œ ์„ฑ๋Šฅ๊ณผ ํ‰๊ฐ€ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์„ฑ๋Šฅ์˜ ์ฐจ์ด๋ฅผ ์˜๋ฏธํ•œ๋‹ค. ์ฐจ์ด๊ฐ€ ์ž‘์„์ˆ˜๋ก ์ผ๋ฐ˜ํ™” ์„ฑ๋Šฅ์ด ๋†’์œผ๋ฉฐ, ์ด๋Š” ๊ณง ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ๋†’์€ ์ƒ์šฉํ™” ๊ฐ€๋Šฅ์„ฑ์„ ๋‚ดํฌํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ•™์Šต ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์†์‹คํ•จ์ˆ˜๋งŒ์„ ์ค„์ด๋Š” ํ•™์Šต ๋ฐฉ๋ฒ•์€ ํ•™์Šต ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ๊ณผ์ ํ•ฉ ํ˜„์ƒ์„ ๋ถˆ๋Ÿฌ์˜ค๋ฉฐ, ์ด๋Š” ๊ณง ํ‰๊ฐ€ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์„ฑ๋Šฅ ๊ฐ์†Œ๋กœ ์ด์–ด์ง์ด ์—ฌ๋Ÿฌ ์„ ํ–‰ ์—ฐ๊ตฌ์— ์˜ํ•ด ๋ฐํ˜€์ง„ ๋ฐ” ์žˆ๋‹ค. ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์„ฑ๋Šฅ ํ–ฅ์ƒ์€ ํ•™์Šต ๋ฐ์ดํ„ฐ๊ฐ€ ์•„๋‹Œ ํ‰๊ฐ€ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด ํŒ๋‹จ๋˜๋ฏ€๋กœ, ์ผ๋ฐ˜ํ™” ์„ฑ๋Šฅ์˜ ๋‹ฌ์„ฑ์€ ๋ชจ๋“  ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ๊ถ๊ทน์ ์ธ ๋ชฉํ‘œ๋ผ๊ณ  ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์˜ ํƒ์ƒ‰์„ ํ†ตํ•ด ๋‘ ๋…ผ์˜์ ์— ๋Œ€ํ•œ ๋ถ„์„๊ณผ ๊ฐ ๋…ผ์˜์ ์— ๋Œ€์‘ํ•˜๋Š” ์ง€ํ‘œ๋ฅผ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋Š” ํ•™์Šต ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ์„ , ๊ฐ•๊ฑด์„ฑ์˜ ์ดํ•ด์™€ ํ–ฅ์ƒ ์„ ์œ„ํ•ด ์ž…๋ ฅ๊ฐ’์— ๋Œ€ํ•œ ์†์‹คํ•จ์ˆ˜๋ฅผ ๋ถ„์„ํ•œ๋‹ค. ์ ๋Œ€์  ๊ณต๊ฒฉ์€ ์ž…๋ ฅ๊ฐ’์— ๋Œ€ํ•ด ์†์‹คํ•จ์ˆ˜๋ฅผ ์ตœ๋Œ€ํ™”ํ•˜๋Š” ์„ญ๋™์„ ์ƒ์„ฑํ•˜๋ฏ€๋กœ, ๋น„์ •์ƒ์ ์ธ ์„ญ๋™์ด ๋”ํ•ด์ง„ ์ž…๋ ฅ๊ฐ’์— ๋Œ€ํ•ด์„œ ์†์‹คํ•จ์ˆ˜ ๋ฅผ ์ตœ์†Œํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐฉ์–ด ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ์—ฐ๊ตฌํ•œ๋‹ค. ๊ทธ ์‹œ์ž‘์œผ๋กœ, ์ ๋Œ€์  ๋ฐฉ์–ด ๊ธฐ๋ฒ•์˜ ํ•˜๋‚˜์ธ ๋‹จ์ผ ๋‹จ๊ณ„ ์ ๋Œ€์  ํ•™์Šต์—์„œ ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์ด ์‰ฝ๊ฒŒ ๋’คํ‹€๋ฆด ์ˆ˜ ์žˆ์Œ์„ ๋ฐํ˜€๋‚ธ๋‹ค. ์ œ์•ˆ๋œ ์—ฐ๊ตฌ์—์„œ ๋’คํ‹€๋ฆฐ ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์ด ๋ชจ๋ธ์˜ ๊ฐ•๊ฑด์„ฑ์„ ์‹ฌ๊ฐํ•˜๊ฒŒ ์†์ƒํ•  ์ˆ˜ ์žˆ์Œ์„ ๋ณด์ด๊ณ , ์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๋งค๋„๋Ÿฌ์šด ์†์‹คํ•จ์ˆ˜๋ฅผ ๊ฐ–๋Š” ๊ฒƒ์˜ ์ค‘์š”์„ฑ์„ ์ฆ๋ช…ํ•œ๋‹ค. ์†์‹คํ•จ์ˆ˜ ํ‰๋ฉด์˜ ํŠน์„ฑ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋‹ค์–‘ํ•œ ์˜์—ญ์—์„œ์˜ ์ ๋Œ€์  ๊ณต๊ฒฉ๊ณผ ๋ฐฉ์–ด ๊ธฐ๋ฒ•์— ๋Œ€ํ•œ ๋ถ„์„๊ณผ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ์—ฐ๊ตฌํ•œ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋กœ, ๊ตฌ์กฐ๋‚˜ ๊ฐ€์ค‘์น˜๊ฐ€ ์ƒ์ดํ•œ ๋ชจ๋ธ์—์„œ ์ ๋Œ€์  ์˜ˆ์ œ๋ฅผ ์ƒ ์„ฑํ•˜์—ฌ ๋Œ€์ƒ ๋ชจ๋ธ๋กœ ๊ณต๊ฒฉํ•˜๋Š” ์ „์ด ๊ณต๊ฒฉ์˜ ์„ธ๊ธฐ๊ฐ€ ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด๊ณผ ๊นŠ์ด ๊ด€๋ จ์ด ์žˆ์Œ์„ ์ฆ๋ช…ํ•œ๋‹ค. ์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ฐ•๋ ฅํ•œ ์ ๋Œ€์  ์†Œ๋ฆฌ ์˜ˆ์ œ๋ฅผ ์ƒ์„ฑํ•˜๊ณ , ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ๊ฐ•๊ฑด์„ฑ ์ˆ˜์ค€์„ ์ œ์•ˆํ•œ๋‹ค. ์ด์–ด ์ ๋Œ€์  ํ•™์Šต์˜ ํŠน์ง•๊ณผ ํ•™์Šต๋œ ๋ชจ๋ธ์˜ ์†์‹คํ•จ์ˆ˜ํ‰ ๋ฉด์„ ํƒ์ƒ‰ํ•œ๋‹ค. ์ž…๋ ฅ๊ฐ’์— ๋Œ€ํ•œ ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์„ ๋ถ€๋“œ๋Ÿฝ๊ฒŒ ๋งŒ๋“ค๊ธฐ ์œ„ํ•˜์—ฌ, ์ ๋Œ€์  ํ•™์Šต์— ์ค‘์•™์ ์„ ๊ณ ๋ คํ•œ ์†์‹คํ•จ์ˆ˜๋ฅผ ๋„์ž…ํ•˜์—ฌ ๋ชจ๋ธ์˜ ๊ฐ•๊ฑด์„ฑ์„ ๋†’์ธ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ์ผ๋ฐ˜ํ™”์˜ ์ดํ•ด์™€ ํ–ฅ์ƒ์„ ์œ„ํ•ด ๊ฐ€์ค‘์น˜์— ๋Œ€ํ•œ ์†์‹คํ•จ์ˆ˜๋ฅผ ๋ถ„์„ํ•œ๋‹ค. ์ตœ๊ทผ ์ผ๋ จ์˜ ์—ฐ๊ตฌ์—์„œ๋Š” ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์ผ๋ฐ˜ํ™” ์„ฑ๋Šฅ์€ ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์˜ ํ‰ํ‰ํ•จ๊ณผ ๊ธด๋ฐ€ํ•˜๊ฒŒ ์—ฐ๊ฒฐ๋˜์–ด ์žˆ์Œ์ด ์ฆ๋ช…๋œ ๋ฐ” ์žˆ๋‹ค. ์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ œ์•ˆ๋œ ์ฒจ์˜ˆ ๊ธฐ๋ฐ˜ ํ•™์Šต์€ ์ฒจ์˜ˆํ•œ ์ตœ์ ์  ์„ ๊ธฐํ”ผํ•˜๊ณ  ํ‰ํ‰ํ•œ ์ตœ์ ์ ์„ ์ฐพ์Œ์œผ๋กœ์จ ๋†’์€ ์ผ๋ฐ˜ํ™” ์„ฑ๋Šฅ์„ ๋‹ฌ์„ฑํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ฒจ์˜ˆ ๊ธฐ๋ฐ˜ ํ•™์Šต ๋ฐฉ๋ฒ•์˜ ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์— ๋Œ€ํ•œ ๋ถ„์„์„ ์ง„ํ–‰ํ•œ๋‹ค. ์šฐ์„  ์ฒจ์˜ˆ ๊ธฐ๋ฐ˜ ํ•™์Šต์ด ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์— ์•ˆ์žฅ์ ์ด ์กด์žฌํ•  ๊ฒฝ์šฐ ์ˆ˜๋ ด์ด ๋ถˆ์•ˆ์ •ํ•จ์„ ๋ฐํžŒ๋‹ค. ๋ถˆ์•ˆ์ •ํ•œ ์ˆ˜๋ ด ๋•Œ ๋ฌธ์— ์ตœ์ ์ ์ด ์•„๋‹Œ ์•ˆ์žฅ์ ์— ๊ฐ‡ํžˆ๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋ฐœ์ƒํ•˜๋ฉฐ, ์ด๋Š” ์ฒจ์˜ˆ ๊ธฐ๋ฐ˜ ํ•™์Šต์˜ ์„ฑ๋Šฅ์„ ์ €ํ•ดํ•จ์„ ๋ณด์ธ๋‹ค. ๋ถˆ์•ˆ์ •ํ•œ ์ˆ˜๋ ด์„ ๊ฐœ์„ ํ•˜๊ณ  ๋” ๋†’์€ ์ผ๋ฐ˜ํ™” ์„ฑ๋Šฅ์„ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด, ๊ฐ€์ค‘์น˜ ๊ณต๊ฐ„์—์„œ์˜ ์„ญ๋™์„ ๊ตฌํ•˜๋Š” ๋‹จ๊ณ„์—์„œ ๋„์ถœ๋˜๋Š” ๋ชจ๋“  ์ค‘์•™์ ์˜ ๊ธฐ์šธ๊ธฐ ์ •๋ณด๋ฅผ ํ™œ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์†์‹คํ•จ์ˆ˜ํ‰๋ฉด์— ๋Œ€ํ•œ ํƒ์ƒ‰๊ณผ ๊ณ ์ฐฐ์„ ๋ฐ”ํƒ•์œผ๋กœ ๊ฐ•๊ฑด์„ฑ๊ณผ ์ผ๋ฐ˜ํ™”์— ๋Œ€ํ•œ ๋” ๊นŠ์€ ์ดํ•ด๋ฅผ ์ œ์‹œํ•˜๊ณ , ์ด๋ฅผ ํ†ตํ•ด์„œ ๊ฐ ์ง€ํ‘œ์˜ ํ–ฅ์ƒ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด ์ ๋Œ€์  ๊ณต๊ฒฉ ๋ฐฉ๋ฒ•, ์ ๋Œ€์  ๋ฐฉ์–ด ๋ฐฉ๋ฒ•, ์ฒจ์˜ˆ ๊ธฐ๋ฐ˜ ํ•™์Šต ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค. ์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋Š” ํ–ฅํ›„ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์‹คํ˜„์„ ์œ„ํ•œ ์ถ”ํ›„ ์—ฐ๊ตฌ์— ํ™•์žฅ์„ฑ ์žˆ๋Š” ๋ชจ๋ธ์ด๋ฉฐ, ๊ฐ•๊ฑด์„ฑ๊ณผ ์ผ๋ฐ˜ํ™”์— ์žˆ์–ด ์†์‹คํ•จ์ˆ˜ํ‰ ๋ฉด์— ๋Œ€ํ•œ ์‹ฌ๋„ ์žˆ๋Š” ๋ถ„์„์ด ์„ ํ–‰๋˜์–ด์•ผ ํ•œ๋‹ค๋Š” ํ•จ์˜์ ์„ ์ œ๊ณตํ•œ๋‹ค.Recent advances in deep learning have demonstrated significant performance improvements in various domains, such as computer vision and speech recognition, yielding numerous industrial applications. Compared to other machine learning models, deep learning models have a large number of parameters and this brings near zero training loss that was previously considered impossible. To train these overparameterized models, we generally minimize the loss on training data, which we call empirical risk minimization (ERM). However, recent studies have demonstrated that these deep learning models trained by ERM may suffer from two major problems: adversarial vulnerability and poor generalization. Adversarial vulnerability is an intriguing property of deep learning models that makes them susceptible to adversarial attacks that create malicious examples with slight modifications (Szegedy et al., 2013; Goodfellow et al., 2014). Prior studies have also confirmed that there exist the potential risks of deep learning models in real-world applications (Papernot et al., 2017; Kurakin et al., 2016). Adversarial attacks entail severe hazards in real-world applications, e.g., causing autonomous vehicle accidents by manipulating decision-making or extracting private information by circumventing voice authorization. Thus, to prevent these malicious cases arisen from the existence of adversarial attacks, many researchers proposed various methods to enhance the robustness of deep learning models against adversarial attacks. Poor generalization, another issue with current deep learning models, is a large discrepancy between training accuracy and test accuracy. In other words, existing methods can successfully minimize loss on train datasets, but this does not guarantee high performance on test datasets (Ishida et al., 2020; Foret et al., 2020). To achieve an ideal performance over various domains, improving the generalization of neural networks has been a core challenge in deep learning. In this dissertation, focusing on the fact that both robustness and generalization are heavily related to the loss landscape, we aim to gain a deeper understanding of adversarial robustness and generalization performance of deep learning models by analyzing their loss landscape. First, we investigate the adversarial robustness with respect to its loss landscape. Through analyzing the loss landscape of adversarially trained models, we discover that the distortion of the loss landscape can occur, resulting in poor adversarial robustness. Based on this observation, we extend the loss landscape analysis to adversarial attacks and defenses to improve the adversarial robustness of deep learning models. We further analyze sharpness-aware minimization with its loss landscape and reveal that there exists a convergence instability problem due to its inherent algorithm. Specifically, whether the loss landscape in the parameter space has a saddle point can heavily affect the optimization and its generalization performance. Given this phenomenon, we investigate the loss landscape with respect to perturbation in the parameter space and improve generalization performance by exploring a wider loss landscape.Chapter 1 Introduction 1 1.1 Motivation of the Dissertation 1 1.2 Aims of the Dissertation 4 1.3 Organization of the Dissertation 6 Chapter 2 Adversarial Robustness and Loss Landscape 8 2.1 Chapter Overview 8 2.2 Preliminaries 11 2.2.1 Adversarial Robustness 11 2.2.2 Single-step and Multi-step Adversarial Attack 12 2.2.3 Catastrophic Overfitting 13 2.3 Methodology 15 2.3.1 Revisiting Catastrophic Overfitting 15 2.3.2 Stable Single-Step Adversarial Training 19 2.4 Experiments . 24 2.4.1 Experimental Setup 24 2.4.2 Visualizing Decision Boundary Distortion 27 2.4.3 Distortion and Nonlinearity of the Loss Function 31 2.4.4 Adversarial Robustness 33 2.5 Chapter Summary 35 Chapter 3 Geometry-Aware Adversarial Attack and Defense 36 3.1 Chapter Overview 36 3.2 Preliminaries 37 3.2.1 Adversarial Attack 37 3.2.2 Adversarial Defense 41 3.3 Methodology 43 3.3.1 Transferable Adversarial Examples 43 3.3.2 Improved Adversarial Training 55 3.4 Experiments . 68 3.4.1 Transferability 68 3.4.2 Adversarial Robustness 74 3.5 Chapter Summary 85 Chapter 4 Generalization and Loss Landscape 86 4.1 Chapter Overview 86 4.2 Preliminaries 89 4.2.1 Generliazation and Sharpness-Aware Minimization 89 4.2.2 Escaping Saddle Points 91 4.3 Methodology 92 4.3.1 Asymptotic Behavior of SAM Dynamics 92 4.3.2 Saddle Point Becomes Attractor in SAM Dynamics 97 4.4 Experiments . 101 4.4.1 Stochastic Behavior of SAM Dynamics 101 4.4.2 Convergence Instability and Training Tricks 107 4.5 Chapter Summary 111 Chapter 5 Sharpness-Aware Minimization with Multi-Ascent 113 5.1 Chapter Overview 113 5.2 Preliminaries 115 5.3 Methodology 118 5.3.1 Revisiting Number of Ascent Steps in SAM 118 5.3.2 Multi-ascent Sharpness-Aware Minimization 122 5.4 Experiments . 125 5.4.1 Experimental Setup 125 5.4.2 Generalization Performance 126 5.4.3 Escaping Local Minima 127 5.5 Chapter Summary 128 Chapter 6 Conclusion 129 6.1 Contributions 129 6.2 Future Work 130 Bibliography 131 ๊ตญ๋ฌธ์ดˆ๋ก 171๋ฐ•

    Electronic Imaging & the Visual Arts. EVA 2013 Florence

    Get PDF
    Important Information Technology topics are presented: multimedia systems, data-bases, protection of data, access to the content. Particular reference is reserved to digital images (2D, 3D) regarding Cultural Institutions (Museums, Libraries, Palace โ€“ Monuments, Archaeological Sites). The main parts of the Conference Proceedings regard: Strategic Issues, EC Projects and Related Networks & Initiatives, International Forum on โ€œCulture & Technologyโ€, 2D โ€“ 3D Technologies & Applications, Virtual Galleries โ€“ Museums and Related Initiatives, Access to the Culture Information. Three Workshops are related to: International Cooperation, Innovation and Enterprise, Creative Industries and Cultural Tourism

    Virtual Worlds and Conservational Channel Evolution and Pollutant Transport Systems (Concepts)

    Get PDF
    Many models exist that predict channel morphology. Channel morphology is defined as the change in geometric parameters of a river. Channel morphology is affected by many factors. Some of these factors are caused either by man or by nature. To combat the adverse effects that man and nature may cause to a water system, scientists and engineers develop stream rehabilitation plans. Stream rehabilitation as defined by Shields et al., states that restoration is the return from a degraded ecosystem back to a close approximation of its remaining natural potential [Shields et al., 2003]. Engineers construct plans that will restore streams back to their natural state by using techniques such as field investigation, analytical models, or numerical models. Each of these techniques is applied to projects based on specified criteria, objectives, and the expertise of the individuals devising the plan. The utilization of analytical and numerical models can be difficult, for many reasons, one of which is the intuitiveness of the modeling process. Many numerical models exist in the field of hydraulic engineering, fluvial geomorphology, landscape architecture, and stream ecology that evaluate and formulate stream rehabilitation plans. This dissertation will explore, in the field of Hydroscience , the creation of models that are not only accurate but also span the different disciplines. The goal of this dissertation is to transform a discrete numerical model (CONCEPTS) into a realistic 3D environment using open source game engines, while at the same time, conveying at least the equivalent information that was presented in the 1D numerical model
    • โ€ฆ
    corecore