Loading [MathJax]/extensions/TeX/boldsymbol.js
Fast Adversarial Training With Adaptive Step Size | IEEE Journals & Magazine | IEEE Xplore

Fast Adversarial Training With Adaptive Step Size


Abstract:

While adversarial training and its variants have shown to be the most effective algorithms to defend against adversarial attacks, their extremely slow training process ma...Show More

Abstract:

While adversarial training and its variants have shown to be the most effective algorithms to defend against adversarial attacks, their extremely slow training process makes it hard to scale to large datasets like ImageNet. The key idea of recent works to accelerate adversarial training is to substitute multi-step attacks (e.g., PGD) with single-step attacks (e.g., FGSM). However, these single-step methods suffer from catastrophic overfitting, where the accuracy against PGD attack suddenly drops to nearly 0% during training, and the network totally loses its robustness. In this work, we study the phenomenon from the perspective of training instances. We show that catastrophic overfitting is instance-dependent, and fitting instances with larger input gradient norm is more likely to cause catastrophic overfitting. Based on our findings, we propose a simple but effective method, Adversarial Training with Adaptive Step size (ATAS). ATAS learns an instance-wise adaptive step size that is inversely proportional to its gradient norm. Our theoretical analysis shows that ATAS converges faster than the commonly adopted non-adaptive counterparts. Empirically, ATAS consistently mitigates catastrophic overfitting and achieves higher robust accuracy on CIFAR10, CIFAR100, and ImageNet when evaluated on various adversarial budgets. Our code is released at https://github.com/HuangZhiChao95/ATAS.
Published in: IEEE Transactions on Image Processing ( Volume: 32)
Page(s): 6102 - 6114
Date of Publication: 26 October 2023

ISSN Information:

PubMed ID: 37883291

Funding Agency:

References is not available for this document.

I. Introduction

Adversarial examples [1], [2] cause serious safety concerns in deploying deep learning models. In order to defend against adversarial attacks, many approaches have been proposed [3], [4], [5], [6], [7], [8], [9]. Among them, adversarial training and its variants [7], [8], [10] have been recognized as the most effective defense mechanism. Adversarial training (AT) is generally formulated as a minimax problem \begin{equation*} \min _{ \boldsymbol {\theta }}\max _{ {\mathbf {x}}_{i}^{\ast} \in {\mathcal {B}} _{p}({\mathbf {x}}_{i}, \varepsilon)} \frac {1}{n} \sum _{i=1}^{n} \ell ({\mathbf {x}}_{i}^{\ast}, y_{i}; { \boldsymbol {\theta }})\;, \tag{1}\end{equation*} where is the training set and is the loss function parametrized by . represents a norm ball centered at with radius . AT in Equation (1) boosts the adversarial robustness by adopting adversarial examples generated in the inner maximization. Despite the effectiveness of AT, solving the inner maximization requires multiple steps of projected gradient descent (PGD) [7], [11]. Therefore, AT is much slower than vanilla training (e.g., 10 times longer training time for AT in [11]), making it challenging to scale AT to large datasets such as ImageNet.

Select All
1.
C. Szegedy et al., "Intriguing properties of neural networks", Proc. Int. Conf. Learn. Represent., pp. 1-10, 2014.
2.
J. Wang, A. Liu, X. Bai and X. Liu, "Universal adversarial patch attack for automatic checkout using perceptual and attentional bias", IEEE Trans. Image Process., vol. 31, pp. 598-611, 2022.
3.
C. Guo, M. Rana, M. Cisse and L. van der Maaten, "Countering adversarial images using input transformations", Proc. Int. Conf. Learn. Represent., pp. 1-12, 2018, [online] Available: https://openreview.net/forum?id=SyJ7ClWCb.
4.
F. Liao, M. Liang, Y. Dong, T. Pang, X. Hu and J. Zhu, "Defense against adversarial attacks using high-level representation guided denoiser", Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit., pp. 1778-1787, Jun. 2018.
5.
A. Mustafa, S. H. Khan, M. Hayat, J. Shen and L. Shao, "Image super-resolution as a defense against adversarial attacks", IEEE Trans. Image Process., vol. 29, pp. 1711-1724, 2020.
6.
S. Zhang, H. Gao and Q. Rao, "Defense against adversarial attacks by reconstructing images", IEEE Trans. Image Process., vol. 30, pp. 6117-6129, 2021.
7.
A. Madry, A. Makelov, L. Schmidt, D. Tsipras and A. Vladu, "Towards deep learning models resistant to adversarial attacks", Proc. Int. Conf. Learn. Represent., pp. 1-28, 2018.
8.
H. Zhang, Y. Yu, J. Jiao, E. Xing, L. El Ghaoui and M. Jordan, "Theoretically principled trade-off between robustness and accuracy", Proc. Int. Conf. Mach. Learn., pp. 7472-7482, 2019.
9.
A. Liu, X. Liu, H. Yu, C. Zhang, Q. Liu and D. Tao, "Training robust deep neural networks via adversarial noise propagation", IEEE Trans. Image Process., vol. 30, pp. 5769-5781, 2021.
10.
Y. Wang, D. Zou, J. Yi, J. Bailey, X. Ma and Q. Gu, "Improving adversarial robustness requires revisiting misclassified examples", Proc. Int. Conf. Learn. Represent., pp. 1-14, 2019.
11.
L. Rice, E. Wong and Z. Kolter, "Overfitting in adversarially robust deep learning", Proc. Int. Conf. Mach. Learn., pp. 8093-8104, 2020.
12.
E. Wong, L. Rice and J. Z. Kolter, "Fast is better than free: Revisiting adversarial training", Proc. Int. Conf. Learn. Represent., pp. 1-17, 2020, [online] Available: https://openreview.net/forum?id=BJx040EFvH.
13.
H. Zheng, Z. Zhang, J. Gu, H. Lee and A. Prakash, "Efficient adversarial training with transferable adversarial examples", Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 1178-1187, Jun. 2020.
14.
M. Andriushchenko and N. Flammarion, "Understanding and improving fast adversarial training", Proc. Adv. Neural Inf. Process. Syst., vol. 33, pp. 16048-16059, 2020.
15.
H. Kim, W. Lee and J. Lee, "Understanding catastrophic overfitting in single-step adversarial training", Proc. AAAI Conf. Artif. Intell., vol. 35, no. 9, pp. 8119-8127, 2021.
16.
A. Krizhevsky and G. Hinton, "Learning multiple layers of features from tiny images", 2009, [online] Available: https://www.cs.toronto.edu/~kriz/learning-features-2009-TR.pdf.
17.
J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li and L. Fei-Fei, "ImageNet: A large-scale hierarchical image database", Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp. 248-255, Jun. 2009.
18.
F. Croce and M. Hein, "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks", Proc. Int. Conf. Mach. Learn., pp. 2206-2216, 2020.
19.
I. J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples", Proc. Int. Conf. Learn. Represent., pp. 1-11, 2015.
20.
M. Andriushchenko, F. Croce, N. Flammarion and M. Hein, "Square attack: A query-efficient black-box adversarial attack via random search", Proc. Eur. Conf. Comput. Vis., pp. 484-501, 2020.
21.
F. Croce and M. Hein, "Minimally distorted adversarial examples with a fast adaptive boundary attack", Proc. Int. Conf. Mach. Learn., pp. 2196-2205, 2020.
22.
Y. Song, T. Kim, S. Nowozin, S. Ermon and N. Kushman, "Pixeldefend: Leveraging generative models to understand and defend against adversarial examples", Proc. Int. Conf. Learn. Represent., pp. 1-20, 2018, [online] Available: https://openreview.net/forum?id=rJUYGxbCW.
23.
Y. Balaji, T. Goldstein and J. Hoffman, "Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets", arXiv:1910.08051, 2019.
24.
G. Sriramanan, S. Addepalli and A. Baburaj, "Guided adversarial attack for evaluating and enhancing adversarial defenses", Proc. Adv. Neural Inf. Process. Syst., vol. 33, pp. 20297-20308, 2020.
25.
T. Basar and G. J. Olsder, Dynamic Noncooperative Game Theory, Philadelphia, PA, USA:SIAM, 1998.
26.
T. Roughgarden, "Algorithmic game theory", Commun. ACM, vol. 53, no. 7, pp. 78-86, 2010.
27.
A. Mokhtari, A. Ozdaglar and S. Pattathil, "A unified analysis of extra-gradient and optimistic gradient methods for saddle point problems: Proximal point approach", Proc. Int. Conf. Artif. Intell. Statist., pp. 1497-1507, 2020.
28.
T. Lin, C. Jin and M. Jordan, "On gradient descent ascent for nonconvex-concave minimax problems", Proc. Int. Conf. Mach. Learn., pp. 6083-6093, 2020.
29.
E. Wong and Z. Kolter, "Provable defenses against adversarial examples via the convex outer adversarial polytope", Proc. Int. Conf. Mach. Learn., pp. 5286-5295, 2018.
30.
A. Shafahi et al., "Adversarial training for free!", Proc. Adv. Neural Inf. Process. Syst., vol. 32, pp. 1-12, 2019.

Contact IEEE to Subscribe

References

References is not available for this document.