Visualizing One Pixel Attack Using Adversarial Maps

Wanyi Wang, Jian Sun, Gang Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

One pixel attack is one of the most puzzling adversarial attacks, in which the position of the attack plays an important role. However, little research has been conducted on the distributions of one pixel attack. In this context, a technique called adversarial maps is proposed, which helps visualize the distributions of one pixel attack for the first time. Adversarial maps consist of pixel adversarial maps and probability adversarial maps, which record the pixel changes and the confidence of the target class in successful attack cases, respectively. Leveraging this technique, one pixel attack distributions and why the position of one pixel attack impacts success rate is explored. Adversarial maps reveal that successful attacks always group as regions and the high saliency areas of saliency maps are more likely to be attacked successfully. Moreover, these observations are further corroborated by a mathematical analysis, demonstrating that adversarial attacks are disturbances in the saliency maps.

Original languageEnglish
Title of host publicationProceedings - 2020 Chinese Automation Congress, CAC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages924-929
Number of pages6
ISBN (Electronic)9781728176871
DOIs
Publication statusPublished - 6 Nov 2020
Event2020 Chinese Automation Congress, CAC 2020 - Shanghai, China
Duration: 6 Nov 20208 Nov 2020

Publication series

NameProceedings - 2020 Chinese Automation Congress, CAC 2020

Conference

Conference2020 Chinese Automation Congress, CAC 2020
Country/TerritoryChina
CityShanghai
Period6/11/208/11/20

Keywords

  • adversarial maps
  • attack distributions
  • one pixel attack
  • saliency maps

Fingerprint

Dive into the research topics of 'Visualizing One Pixel Attack Using Adversarial Maps'. Together they form a unique fingerprint.

Cite this