Xingxing Wei, Caixin Kang, Yinpeng Dong, Zhengyi Wang, Shouwei Ruan, Yubo Chen, Hang Su
{"title":"Real-world Adversarial Defense against Patch Attacks based on Diffusion Model","authors":"Xingxing Wei, Caixin Kang, Yinpeng Dong, Zhengyi Wang, Shouwei Ruan, Yubo Chen, Hang Su","doi":"arxiv-2409.09406","DOIUrl":null,"url":null,"abstract":"Adversarial patches present significant challenges to the robustness of deep\nlearning models, making the development of effective defenses become critical\nfor real-world applications. This paper introduces DIFFender, a novel\nDIFfusion-based DeFender framework that leverages the power of a text-guided\ndiffusion model to counter adversarial patch attacks. At the core of our\napproach is the discovery of the Adversarial Anomaly Perception (AAP)\nphenomenon, which enables the diffusion model to accurately detect and locate\nadversarial patches by analyzing distributional anomalies. DIFFender seamlessly\nintegrates the tasks of patch localization and restoration within a unified\ndiffusion model framework, enhancing defense efficacy through their close\ninteraction. Additionally, DIFFender employs an efficient few-shot\nprompt-tuning algorithm, facilitating the adaptation of the pre-trained\ndiffusion model to defense tasks without the need for extensive retraining. Our\ncomprehensive evaluation, covering image classification and face recognition\ntasks, as well as real-world scenarios, demonstrates DIFFender's robust\nperformance against adversarial attacks. The framework's versatility and\ngeneralizability across various settings, classifiers, and attack methodologies\nmark a significant advancement in adversarial patch defense strategies. Except\nfor the popular visible domain, we have identified another advantage of\nDIFFender: its capability to easily expand into the infrared domain.\nConsequently, we demonstrate the good flexibility of DIFFender, which can\ndefend against both infrared and visible adversarial patch attacks\nalternatively using a universal defense framework.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"212 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.09406","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Adversarial patches present significant challenges to the robustness of deep
learning models, making the development of effective defenses become critical
for real-world applications. This paper introduces DIFFender, a novel
DIFfusion-based DeFender framework that leverages the power of a text-guided
diffusion model to counter adversarial patch attacks. At the core of our
approach is the discovery of the Adversarial Anomaly Perception (AAP)
phenomenon, which enables the diffusion model to accurately detect and locate
adversarial patches by analyzing distributional anomalies. DIFFender seamlessly
integrates the tasks of patch localization and restoration within a unified
diffusion model framework, enhancing defense efficacy through their close
interaction. Additionally, DIFFender employs an efficient few-shot
prompt-tuning algorithm, facilitating the adaptation of the pre-trained
diffusion model to defense tasks without the need for extensive retraining. Our
comprehensive evaluation, covering image classification and face recognition
tasks, as well as real-world scenarios, demonstrates DIFFender's robust
performance against adversarial attacks. The framework's versatility and
generalizability across various settings, classifiers, and attack methodologies
mark a significant advancement in adversarial patch defense strategies. Except
for the popular visible domain, we have identified another advantage of
DIFFender: its capability to easily expand into the infrared domain.
Consequently, we demonstrate the good flexibility of DIFFender, which can
defend against both infrared and visible adversarial patch attacks
alternatively using a universal defense framework.