论文标题
对模式识别方面的强大对抗训练的调查:基本,理论和方法论
A Survey of Robust Adversarial Training in Pattern Recognition: Fundamental, Theory, and Methodologies
论文作者
论文摘要
在过去的几十年中,深层神经网络在机器学习,计算机视觉和模式识别方面取得了巨大的成功。然而,最近的研究表明,神经网络(浅层和深度)很容易被某些不知不觉地扰动的输入样本所愚弄,称为对抗性例子。近年来,这种安全脆弱性导致了大量研究,因为由于神经网络的广泛应用,现实世界中的威胁可能会引入。为了解决对抗性示例的鲁棒性问题,尤其是在模式识别中,强大的对抗训练已成为一个主流。该领域已经蓬勃发展。然而,对对抗性训练的深入了解,包括特征,解释,理论和不同模型之间的联系仍然难以捉摸。在本文中,我们提出了一项全面的调查,试图提供有关模式识别中强大的对抗训练的系统和结构化调查。我们从基本面开始,包括定义,符号和对抗性示例的特性。然后,我们引入了一个统一的理论框架,以防御对抗样本 - 可视化的良好对抗训练以及关于对抗性训练为什么会导致模型鲁棒性的解释。在对抗性培训和其他传统学习理论之间也将建立联系。之后,我们以结构化的方式总结,审查和讨论具有对抗性攻击和防御/训练算法的各种方法。最后,我们介绍了分析,前景和对抗训练的评论。
In the last a few decades, deep neural networks have achieved remarkable success in machine learning, computer vision, and pattern recognition. Recent studies however show that neural networks (both shallow and deep) may be easily fooled by certain imperceptibly perturbed input samples called adversarial examples. Such security vulnerability has resulted in a large body of research in recent years because real-world threats could be introduced due to vast applications of neural networks. To address the robustness issue to adversarial examples particularly in pattern recognition, robust adversarial training has become one mainstream. Various ideas, methods, and applications have boomed in the field. Yet, a deep understanding of adversarial training including characteristics, interpretations, theories, and connections among different models has still remained elusive. In this paper, we present a comprehensive survey trying to offer a systematic and structured investigation on robust adversarial training in pattern recognition. We start with fundamentals including definition, notations, and properties of adversarial examples. We then introduce a unified theoretical framework for defending against adversarial samples - robust adversarial training with visualizations and interpretations on why adversarial training can lead to model robustness. Connections will be also established between adversarial training and other traditional learning theories. After that, we summarize, review, and discuss various methodologies with adversarial attack and defense/training algorithms in a structured way. Finally, we present analysis, outlook, and remarks of adversarial training.