Zeyu Zhao, Ke Xu, Laijin Meng, Tanfeng Sun, Xinghao Jiang
{"title":"INN-RAE: Reversible adversarial examples based on invertible neural networks for facial protection","authors":"Zeyu Zhao, Ke Xu, Laijin Meng, Tanfeng Sun, Xinghao Jiang","doi":"10.1016/j.eswa.2025.129962","DOIUrl":null,"url":null,"abstract":"<div><div>Reversible adversarial examples can effectively prevent data from being accessed and recognized by unauthorized deep neural network models, but existing methods struggle to balance the visual quality and attack effectiveness of the generated adversarial examples. This paper proposes a method for generating reversible adversarial examples based on invertible neural networks (INN-RAE), achieving an effective unification of high attack success rate and high visual stealthiness. Specifically, during the forward propagation phase of the invertible neural network, both the clean sample and a noise matrix are input simultaneously, and adversarial examples are generated by fine-tuning the noise matrix. When restoring the adversarial examples, the same invertible neural network can be used to achieve high-quality restoration and remove the attack noise, thereby realizing end-to-end reversible adversarial example generation and restoration. Compared with existing reversible adversarial example generation algorithms, INN-RAE achieves state-of-the-art levels of attack success rate on multiple face datasets and face recognition models, while also achieving better visual stealthiness and restoration effects.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"299 ","pages":"Article 129962"},"PeriodicalIF":7.5000,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Expert Systems with Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0957417425035778","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Reversible adversarial examples can effectively prevent data from being accessed and recognized by unauthorized deep neural network models, but existing methods struggle to balance the visual quality and attack effectiveness of the generated adversarial examples. This paper proposes a method for generating reversible adversarial examples based on invertible neural networks (INN-RAE), achieving an effective unification of high attack success rate and high visual stealthiness. Specifically, during the forward propagation phase of the invertible neural network, both the clean sample and a noise matrix are input simultaneously, and adversarial examples are generated by fine-tuning the noise matrix. When restoring the adversarial examples, the same invertible neural network can be used to achieve high-quality restoration and remove the attack noise, thereby realizing end-to-end reversible adversarial example generation and restoration. Compared with existing reversible adversarial example generation algorithms, INN-RAE achieves state-of-the-art levels of attack success rate on multiple face datasets and face recognition models, while also achieving better visual stealthiness and restoration effects.
期刊介绍:
Expert Systems With Applications is an international journal dedicated to the exchange of information on expert and intelligent systems used globally in industry, government, and universities. The journal emphasizes original papers covering the design, development, testing, implementation, and management of these systems, offering practical guidelines. It spans various sectors such as finance, engineering, marketing, law, project management, information management, medicine, and more. The journal also welcomes papers on multi-agent systems, knowledge management, neural networks, knowledge discovery, data mining, and other related areas, excluding applications to military/defense systems.