{"id":3309,"date":"2022-06-01T06:00:00","date_gmt":"2022-06-01T11:00:00","guid":{"rendered":"https:\/\/baylor.ai\/?p=3309"},"modified":"2023-11-08T12:40:48","modified_gmt":"2023-11-08T18:40:48","slug":"sicem-a-sensitivity-inspired-constrained-evaluation-method-for-adversarial-attacks-on-classifiers-with-occluded-input-data","status":"publish","type":"post","link":"https:\/\/lab.rivas.ai\/?p=3309","title":{"rendered":"SICEM: A Sensitivity-Inspired Constrained Evaluation Method for Adversarial Attacks on Classifiers with Occluded Input Data"},"content":{"rendered":"\n<p>In the rapidly evolving field of artificial intelligence, understanding the sensitivity of models to adversarial attacks is crucial. In our recent paper, Korn Sooksatra introduces the Sensitivity-inspired constrained evaluation method (SICEM) to address this concern.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<cite>Sooksatra, K., Rivas, P. Evaluation of adversarial attacks sensitivity of classifiers with occluded input data.\u00a0<em>Neural Comput &amp; Applic<\/em>\u00a0<strong>34<\/strong>, 17615\u201317632 (2022). <a href=\"https:\/\/doi.org\/10.1007\/s00521-022-07387-y\">https:\/\/doi.org\/10.1007\/s00521-022-07387-y<\/a><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Understanding SICEM<\/h3>\n\n\n\n\n<p>Our proposed method, SICEM, evaluates the vulnerability of an incomplete input against an adversarial attack in comparison to a complete one. This is achieved by leveraging the Jacobian matrix concept. The sensitivity of the target classifier&#8217;s output to each attribute of the input is calculated, providing a comprehensive understanding of how changes in the input can affect the output.<\/p>\n\n<p class=\"ql-center-displayed-equation\" style=\"line-height: 65px;\"><span class=\"ql-right-eqno\"> &nbsp; <\/span><span class=\"ql-left-eqno\"> &nbsp; <\/span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.rivas.ai\/wp-content\/ql-cache\/quicklatex.com-7debb112ae08a65c21b57499530e1209_l3.png\" height=\"65\" width=\"460\" class=\"ql-img-displayed-equation quicklatex-auto-format\" alt=\"&#92;&#91;&#32;&#115;&#40;&#120;&#44;&#121;&#41;&#95;&#105;&#32;&#61;&#32;&#32;&#92;&#108;&#101;&#102;&#116;&#124;&#92;&#109;&#105;&#110;&#32;&#92;&#108;&#101;&#102;&#116;&#40;&#48;&#44;&#32;&#92;&#102;&#114;&#97;&#99;&#123;&#92;&#112;&#97;&#114;&#116;&#105;&#97;&#108;&#32;&#90;&#40;&#120;&#41;&#95;&#121;&#125;&#123;&#92;&#112;&#97;&#114;&#116;&#105;&#97;&#108;&#32;&#120;&#95;&#105;&#125;&#32;&#92;&#99;&#100;&#111;&#116;&#32;&#92;&#108;&#101;&#102;&#116;&#40;&#92;&#115;&#117;&#109;&#95;&#123;&#121;&#94;&#123;&#39;&#125;&#32;&#92;&#110;&#101;&#113;&#32;&#121;&#125;&#32;&#92;&#102;&#114;&#97;&#99;&#123;&#92;&#112;&#97;&#114;&#116;&#105;&#97;&#108;&#32;&#90;&#40;&#120;&#41;&#95;&#123;&#121;&#94;&#123;&#39;&#125;&#125;&#125;&#123;&#92;&#112;&#97;&#114;&#116;&#105;&#97;&#108;&#32;&#120;&#95;&#105;&#125;&#92;&#114;&#105;&#103;&#104;&#116;&#41;&#32;&#92;&#99;&#100;&#111;&#116;&#32;&#67;&#40;&#121;&#44;&#32;&#49;&#44;&#32;&#48;&#41;&#95;&#105;&#92;&#114;&#105;&#103;&#104;&#116;&#41;&#92;&#114;&#105;&#103;&#104;&#116;&#124;&#32;&#92;&#93;\" title=\"Rendered by QuickLaTeX.com\"\/><\/p>\n\n<p>This sensitivity score gives us an insight into how much each attribute of the input contributes to the output&#8217;s sensitivity. The score is then used to estimate the overall sensitivity of the given input and its mask.<\/p>\n\n<p class=\"ql-center-displayed-equation\" style=\"line-height: 53px;\"><span class=\"ql-right-eqno\"> &nbsp; <\/span><span class=\"ql-left-eqno\"> &nbsp; <\/span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.rivas.ai\/wp-content\/ql-cache\/quicklatex.com-3c630b94595468c74cb4dc591073e4ef_l3.png\" height=\"53\" width=\"224\" class=\"ql-img-displayed-equation quicklatex-auto-format\" alt=\"&#92;&#91;&#32;&#83;&#40;&#120;&#44;&#32;&#77;&#41;&#95;&#121;&#32;&#61;&#32;&#92;&#115;&#117;&#109;&#95;&#123;&#105;&#61;&#48;&#125;&#94;&#123;&#110;&#45;&#49;&#125;&#32;&#40;&#115;&#40;&#120;&#44;&#32;&#121;&#41;&#95;&#105;&#32;&#92;&#99;&#100;&#111;&#116;&#32;&#77;&#95;&#105;&#41;&#32;&#92;&#93;\" title=\"Rendered by QuickLaTeX.com\"\/><\/p>\n\n<p>For a complete input, the sensitivity ratio provides a comparative measure of how sensitive the classifier&#8217;s output is for an incomplete input versus a complete one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Results and Implications<\/h3>\n\n\n\n<p>Our focus was on an automobile image from the CIFAR-10 dataset. Interestingly, adversarial examples generated by FGSM and IGSM required the same value of <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.rivas.ai\/wp-content\/ql-cache\/quicklatex.com-729568734d87ffb0f88cf42b1bc6828a_l3.png\" class=\"ql-img-inline-formula quicklatex-auto-format\" alt=\"&#92;&#101;&#112;&#115;&#105;&#108;&#111;&#110;\" title=\"Rendered by QuickLaTeX.com\" height=\"8\" width=\"7\" style=\"vertical-align: 0px;\"\/>, which was significantly lower than for other images. This can be attributed to the layer-wise linearity of the classifier. Larger inputs, like the automobile image, require a smaller <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.rivas.ai\/wp-content\/ql-cache\/quicklatex.com-729568734d87ffb0f88cf42b1bc6828a_l3.png\" class=\"ql-img-inline-formula quicklatex-auto-format\" alt=\"&#92;&#101;&#112;&#115;&#105;&#108;&#111;&#110;\" title=\"Rendered by QuickLaTeX.com\" height=\"8\" width=\"7\" style=\"vertical-align: 0px;\"\/> to create an adversarial example. However, JSMA required a higher <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.rivas.ai\/wp-content\/ql-cache\/quicklatex.com-729568734d87ffb0f88cf42b1bc6828a_l3.png\" class=\"ql-img-inline-formula quicklatex-auto-format\" alt=\"&#92;&#101;&#112;&#115;&#105;&#108;&#111;&#110;\" title=\"Rendered by QuickLaTeX.com\" height=\"8\" width=\"7\" style=\"vertical-align: 0px;\"\/> due to the metric of <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab.rivas.ai\/wp-content\/ql-cache\/quicklatex.com-a456ca49de275e9083f31754083be80b_l3.png\" class=\"ql-img-inline-formula quicklatex-auto-format\" alt=\"&#76;&#95;&#48;\" title=\"Rendered by QuickLaTeX.com\" height=\"15\" width=\"19\" style=\"vertical-align: -3px;\"\/> norm.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"414\" src=\"https:\/\/baylor.ai\/wp-content\/uploads\/2023\/11\/image-1024x414.png\" alt=\"\" class=\"wp-image-3312\" srcset=\"https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1024x414.png 1024w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-300x121.png 300w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-768x311.png 768w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-863x349.png 863w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-267x108.png 267w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image.png 1478w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"415\" src=\"https:\/\/baylor.ai\/wp-content\/uploads\/2023\/11\/image-1-1024x415.png\" alt=\"\" class=\"wp-image-3313\" srcset=\"https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1-1024x415.png 1024w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1-300x122.png 300w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1-768x312.png 768w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1-863x350.png 863w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1-266x108.png 266w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-1.png 1474w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"https:\/\/baylor.ai\/wp-content\/uploads\/2023\/11\/image-2-1024x417.png\" alt=\"\" class=\"wp-image-3314\" srcset=\"https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-2-1024x417.png 1024w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-2-300x122.png 300w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-2-768x312.png 768w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-2-863x351.png 863w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-2-265x108.png 265w, https:\/\/lab.rivas.ai\/wp-content\/uploads\/2023\/11\/image-2.png 1470w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Understanding the sensitivity of AI models is paramount in ensuring their robustness against adversarial attacks. The SICEM method provides a comprehensive tool to ensure safer and more reliable AI systems. Read the full paper here [\u00a0<a href=\"https:\/\/www.rivas.ai\/bibs\/sooksatra2022evaluation.bib\">bib<\/a>\u00a0|\u00a0\u00a0<a href=\"https:\/\/www.rivas.ai\/pdfs\/sooksatra2022evaluation.pdf\">.pdf<\/a>\u00a0].<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Korn Sooksatra&#8217;s paper introduces the Sensitivity-inspired constrained evaluation method (SICEM), which evaluates the vulnerability of artificial intelligence models to adversarial attacks, promoting safer and more reliable AI systems.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":true,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[2],"class_list":["post-3309","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-adversarial-ml"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=\/wp\/v2\/posts\/3309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3309"}],"version-history":[{"count":9,"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=\/wp\/v2\/posts\/3309\/revisions"}],"predecessor-version":[{"id":3358,"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=\/wp\/v2\/posts\/3309\/revisions\/3358"}],"wp:attachment":[{"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab.rivas.ai\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}