Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective Supplementary Materials

ثبت نشده
چکیده

In the main paper, we have reviewed variants of AIPs according to the loss functions and the optimisation algorithms. Algorithms FGV, FGS, BI, and GA use the softmax-log loss − log f̂ . The DeepFool (DF) and our GAMAN variants use the difference of two scores (e.g. f ? − f). This section includes an auxiliary analysis for the effect of the loss type: softmax-log loss− log f̂ versus score loss −f . We denote the score loss analogues with the suffix -S (e.g. FGS-S). We also include FGMAN (Fast Gradient – Maximal Among Non-GT), the single iteration analogue of GAMAN, for completeness. See table 1 for a summary. The corresponding empirical performances are shown in table 2 and 4. Since single-iteration AIPs are significantly outperformed by the multi-iteration AIPs, we have focused on the latter in the main paper, and so do we here. In table 2, we observe that the choice of the loss function does not make much difference. Table 4 further supports this view against image processing techniques, although the softmaxlog loss does perform marginally better.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Information-Theoretic Approach for Privacy Protection in OLAP Systems

We address issues related to the protection of private information in Online Analytical Processing (OLAP) systems, wherea major privacy concern is the adversarial inference of private information from OLAP query answers. Most previous work onprivacy-preserving OLAP focuses on a single aggregate function and/or addresses only exact disclosure, which eliminates fromconsideration an im...

متن کامل

Adversarial AI

In recent years AI research has had an increasing role in models and algorithms for security problems. Game theoretic models of security, and Stackelberg security games in particular, have received special attention, in part because these models and associated tools have seen actual deployment in homeland security and sustainability applications. Stackelberg security games have two prototypical...

متن کامل

Context-Aware Generative Adversarial Privacy

Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve...

متن کامل

Game-Theoretic Strategy for Personalized Privacy Protection

With the development of cloud computing, more and more service providers deploy multitenant applications to the cloud. Multi-tenant data is stored by non-fully trusted SaaS service providers, and the protection of data privacy attracts more attention. This paper proposes a privacy protection strategy customization framework. This framework considers the privacy protection needs, SaaS applicatio...

متن کامل

Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks

This work shows that it is possible to fool/attack recent state-of-the-art face detectors which are based on the single-stage networks. Successfully attacking face detectors could be a serious malware vulnerability when deploying a smart surveillance system utilizing face detectors. We show that existing adversarial perturbation methods are not effective to perform such an attack, especially wh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017