Sign In

Adversarial Evasion Attacks on Computer Vision using SHAP Values

Created by
  • Haebom
Category
Empty

์ €์ž

Frank Mollard, Marcus Becker, Florian Roehrbein

๐Ÿ’ก ๊ฐœ์š”

๋ณธ ๋…ผ๋ฌธ์€ SHAP ๊ฐ’์„ ํ™œ์šฉํ•˜์—ฌ ์ปดํ“จํ„ฐ ๋น„์ „ ๋ชจ๋ธ์— ๋Œ€ํ•œ ํ™”์ดํŠธ๋ฐ•์Šค ๊ณต๊ฒฉ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. ์ œ์•ˆ๋œ ๊ณต๊ฒฉ์€ ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ์ถœ๋ ฅ ์‹ ๋ขฐ๋„๋ฅผ ๋‚ฎ์ถ”๊ฑฐ๋‚˜ ์˜ค๋ถ„๋ฅ˜๋ฅผ ์œ ๋ฐœํ•˜์—ฌ ์„ฑ๋Šฅ์„ ์ €ํ•˜์‹œํ‚ค๋ฉฐ, ์ธ๊ฐ„์˜ ๋ˆˆ์œผ๋กœ๋Š” ๊ฐ์ง€ํ•˜๊ธฐ ์–ด๋ ค์šด ํŠน์ง•์„ ๊ฐ€์ง‘๋‹ˆ๋‹ค. ํŠนํžˆ, SHAP ๊ฐ’์€ ์ถ”๋ก  ๋‹จ๊ณ„์—์„œ ๊ฐœ๋ณ„ ์ž…๋ ฅ์˜ ์ค‘์š”๋„๋ฅผ ์ •๋Ÿ‰ํ™”ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋ฉฐ, ์ด๋Š” ๊ธฐ์กด์˜ Fast Gradient Sign Method(FGSM)์™€ ๋น„๊ตํ•˜์—ฌ ํŠน์ • ์ƒํ™ฉ์—์„œ ๋” ๊ฐ•๊ฑดํ•œ ์˜ค๋ถ„๋ฅ˜๋ฅผ ์ƒ์„ฑํ•จ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค.

๐Ÿ”‘ ์‹œ์‚ฌ์  ๋ฐ ํ•œ๊ณ„

โ€ข
SHAP ๊ฐ’์„ ํ™œ์šฉํ•œ ์ƒˆ๋กœ์šด ์ข…๋ฅ˜์˜ ์ ๋Œ€์  ๊ณต๊ฒฉ ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•˜์—ฌ ์ปดํ“จํ„ฐ ๋น„์ „ ๋ชจ๋ธ์˜ ๋ณด์•ˆ ์ทจ์•ฝ์ ์„ ํƒ๊ตฌํ–ˆ์Šต๋‹ˆ๋‹ค.
โ€ข
์ œ์•ˆ๋œ SHAP ๊ณต๊ฒฉ์€ FGSM๊ณผ ๊ฐ™์€ ๊ธฐ์กด ๊ณต๊ฒฉ๋ณด๋‹ค ํŠน์ • ์กฐ๊ฑด(์˜ˆ: ๊ธฐ์šธ๊ธฐ ์€๋‹‰)์—์„œ ๋” ๊ฐ•๊ฑดํ•œ ์˜ค๋ถ„๋ฅ˜๋ฅผ ์œ ๋„ํ•  ์ˆ˜ ์žˆ์Œ์„ ์ž…์ฆํ–ˆ์Šต๋‹ˆ๋‹ค.
โ€ข
๋ณธ ์—ฐ๊ตฌ๋Š” ์ ๋Œ€์  ๊ณต๊ฒฉ์˜ ์€๋ฐ€์„ฑ๊ณผ ํšจ๊ณผ์„ฑ์„ ๋†’์ผ ์ˆ˜ ์žˆ๋Š” ๊ฐ€๋Šฅ์„ฑ์„ ๋ณด์—ฌ์ฃผ์ง€๋งŒ, ์ธ๊ฐ„์˜ ๋ˆˆ์—๋Š” ๋ณด์ด์ง€ ์•Š๋Š” ๊ณต๊ฒฉ์˜ ์‹ค์ œ ์ ์šฉ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์œค๋ฆฌ์  ์ธก๋ฉด์— ๋Œ€ํ•œ ์ถ”๊ฐ€์ ์ธ ๊ณ ๋ ค๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.
๐Ÿ‘