• Login
    View Item 
    •   eScholar Home
    • Graduate & Postdoctoral Studies
    • Electronic Theses and Dissertations
    • View Item
    •   eScholar Home
    • Graduate & Postdoctoral Studies
    • Electronic Theses and Dissertations
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Design and evaluation of GAN-based models for adversarial training robustness in deep learning

    Thumbnail
    View/Open
    Zhao_Weimin.pdf (1.816Mb)
    Date
    2023-04-01
    Author
    Zhao, Weimin
    Metadata
    Show full item record
    Abstract
    Adversarial attacks show one of the generalization issues of current deep learning models on special distribution shifted data. The adversarial samples generated by the attack algorithm can introduce malicious behavior to any deep learning system that affects the consistency of the deep learning model. This thesis presents the design and evaluation of multiple possible component architectures of a GAN that can provide a new direction for training a robust convolution classifier. Each component is related to a different aspect of the GAN that impacts the generalization and the robustness outcomes. The best formulation can achieve around 45% accuracy under 8/255 L∞ PGD attack and 60% accuracy under 128/255 L2 PGD attack that outperforms L2 PGD adversarial training. The other contributions include the research on gradient masking, robustness transferability across the constraints and the generalization limitations.
    URI
    https://hdl.handle.net/10155/1604
    Collections
    • Electronic Theses and Dissertations [1369]
    • Master Theses & Projects [427]

    Related items

    Showing items related by title, author, creator and subject.

    • Polymorphic Adversarial DDoS attack on IDS using GAN 

      Chauhan, Ravi (2020-12-01)
      IDS are essential components in preventing malicious traffic from penetrating networks. IDS have been rapidly enhancing their detection ability using ML algorithms. As a result, attackers look for new methods to evade the ...
    • Systems and models for secure fallback authentication 

      Addas, Alaadin (2018-12-01)
      Fallback authentication (FA) techniques such as security questions, Email resets, and SMS resets have significant security flaws that easily undermine the primary method of authentication. Security questions have been shown ...
    • A monitoring framework for side-channel information leaks 

      Lescisin, Michael John (2019-04-01)
      Security and privacy in computer systems is becoming an ever important field of study as the information available on these systems is of ever increasing value. The state of research on direct security attacks to computer ...

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of eScholarCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV