Loading [MathJax]/extensions/TeX/boldsymbol.js
Fast Adversarial Training With Adaptive Step Size | IEEE Journals & Magazine | IEEE Xplore

Fast Adversarial Training With Adaptive Step Size


Abstract:

While adversarial training and its variants have shown to be the most effective algorithms to defend against adversarial attacks, their extremely slow training process ma...Show More

Abstract:

While adversarial training and its variants have shown to be the most effective algorithms to defend against adversarial attacks, their extremely slow training process makes it hard to scale to large datasets like ImageNet. The key idea of recent works to accelerate adversarial training is to substitute multi-step attacks (e.g., PGD) with single-step attacks (e.g., FGSM). However, these single-step methods suffer from catastrophic overfitting, where the accuracy against PGD attack suddenly drops to nearly 0% during training, and the network totally loses its robustness. In this work, we study the phenomenon from the perspective of training instances. We show that catastrophic overfitting is instance-dependent, and fitting instances with larger input gradient norm is more likely to cause catastrophic overfitting. Based on our findings, we propose a simple but effective method, Adversarial Training with Adaptive Step size (ATAS). ATAS learns an instance-wise adaptive step size that is inversely proportional to its gradient norm. Our theoretical analysis shows that ATAS converges faster than the commonly adopted non-adaptive counterparts. Empirically, ATAS consistently mitigates catastrophic overfitting and achieves higher robust accuracy on CIFAR10, CIFAR100, and ImageNet when evaluated on various adversarial budgets. Our code is released at https://github.com/HuangZhiChao95/ATAS.
Published in: IEEE Transactions on Image Processing ( Volume: 32)
Page(s): 6102 - 6114
Date of Publication: 26 October 2023

ISSN Information:

PubMed ID: 37883291

Funding Agency:


I. Introduction

Adversarial examples [1], [2] cause serious safety concerns in deploying deep learning models. In order to defend against adversarial attacks, many approaches have been proposed [3], [4], [5], [6], [7], [8], [9]. Among them, adversarial training and its variants [7], [8], [10] have been recognized as the most effective defense mechanism. Adversarial training (AT) is generally formulated as a minimax problem \begin{equation*} \min _{ \boldsymbol {\theta }}\max _{ {\mathbf {x}}_{i}^{\ast} \in {\mathcal {B}} _{p}({\mathbf {x}}_{i}, \varepsilon)} \frac {1}{n} \sum _{i=1}^{n} \ell ({\mathbf {x}}_{i}^{\ast}, y_{i}; { \boldsymbol {\theta }})\;, \tag{1}\end{equation*} where is the training set and is the loss function parametrized by . represents a norm ball centered at with radius . AT in Equation (1) boosts the adversarial robustness by adopting adversarial examples generated in the inner maximization. Despite the effectiveness of AT, solving the inner maximization requires multiple steps of projected gradient descent (PGD) [7], [11]. Therefore, AT is much slower than vanilla training (e.g., 10 times longer training time for AT in [11]), making it challenging to scale AT to large datasets such as ImageNet.

Contact IEEE to Subscribe

References

References is not available for this document.