Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters

Archive ouverte : Communication dans un congrès

El-Allami, R. | Marchisio, A. | Shafique, M. | Alouani, Ihsen

Edité par HAL CCSD ; IEEE

International audience. Deep Learning (DL) algorithms have gained popularity owing to their practical problem-solving capacity. However, they suffer from a serious integrity threat, i.e., their vulnerability to adversarial attacks. In the quest for DL trustworthiness, recent works claimed the inherent robustness of Spiking Neural Networks (SNNs) to these attacks, without considering the variability in their structural spiking parameters. This paper explores the security enhancement of SNNs through internal structural parameters. Specifically, we investigate the SNNs robustness to adversarial attacks with different values of the neuron's firing voltage thresholds and time window boundaries. We thoroughly study SNNs security under different adversarial attacks in the strong white-box setting, with different noise budgets and under variable spiking parameters. Our results show a significant impact of the structural parameters on the SNNs' security, and promising sweet spots can be reached to design trustworthy SNNs with 85% higher robustness than a traditional non-spiking DL system. To the best of our knowledge, this is the first work that investigates the impact of structural parameters on SNNs robustness to adversarial attacks. The proposed contributions and the experimental framework is available online 11https://github.com/rda-ela/SNN-Adversarial-Attacks to the community for reproducible research. © 2021 EDAA.

Consulter en ligne

Suggestions

Du même auteur

CNTFET-Based Ternary Multiply-and-Accumulate Unit | Mohammaden, Amr

CNTFET-Based Ternary Multiply-and-Accumulate Unit

Archive ouverte: Article de revue

Mohammaden, Amr | 2022

International audience. Multiply-Accumulate (MAC) is one of the most commonly used operations in modern computing systems due to its use in matrix multiplication, signal processing, and in new applications such as m...

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability | Tarchoun, Bilel

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adve...

Archive ouverte: Communication dans un congrès

Tarchoun, Bilel | 2021-09-28

International audience. While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adve...

Enabling User Relaying In MCM-NOMA Under Doubly Selective Channels Using Iterative Interference Cancellation Schemes For Wireless IoT Networks | Hamza, Anis Amazigh

Enabling User Relaying In MCM-NOMA Under Doubly Selective Channels Using It...

Archive ouverte: Article de revue

Hamza, Anis Amazigh | 2022-03

International audience. Cell-edge users of future cellular internet of things (IoT) sensor networks can suffer from extremely severe channel conditions, especially under mobility with high speeds, i.e., doubly selec...

Du même sujet

L' investisseur intelligent : une référence en matière d'investissement / Benjamin Graham,... | Graham, Benjamin (1894-1976). Auteur

L' investisseur intelligent : une référence en matière d'investissement / B...

Livre | Graham, Benjamin (1894-1976). Auteur | 2018 - [Nouvelle édition commentée]

"Benjamin Graham, le plus grand financier du XXème siècle, a inspiré nombre d'investisseurs individuels et professionnels. Sa stratégie - l'investissement dans la valeur - permet de bâtir des stratégies de long terme et d'éviter d...

La boîte à outils de la stratégie : 56 outils clés en main + 8 vidéos d'approfondissement / Bertrand Giboin | Giboin, Bertrand (19..-....) - professeur de stratégie. Auteur

La boîte à outils de la stratégie : 56 outils clés en main + 8 vidéos d'app...

Livre | Giboin, Bertrand (19..-....) - professeur de stratégie. Auteur | 2022 - 4e édition

Prise de poste, montée en compétences, évolution professionnelle, nos experts sont vos alliés ! Des fiches opérationnelles au quotidien ; Une structure graphique pour maîtriser l'essentiel en un coup d'œil ; Des cas d'entreprise e...

Essential math for data science : take control of your data with fundamental linear algebra, probability, and statistics / Thomas Nield | Nield, Thomas. Auteur

Essential math for data science : take control of your data with fundamenta...

Livre | Nield, Thomas. Auteur | 2022

To succeed in data science you need some math proficiency. But not just any math. This common-sense guide provides a clear, plain English survey of the math you'll need in data science, including probability, statistics, hypothesi...

Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks | Islam, Shohidul

Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep...

Archive ouverte: Communication dans un congrès

Islam, Shohidul | 2021-11-01

International audience. Deep neural networks (DNNs) are shown to be vulnerable to adversarial attacks-- carefully crafted additive noise that undermines DNNs integrity. Previously proposed defenses against these att...

Understanding financial statements / Lyn M. Fraser, Aileen Ormiston | Fraser, Lyn M. (1943-....). Auteur

Understanding financial statements / Lyn M. Fraser, Aileen Ormiston

Livre | Fraser, Lyn M. (1943-....). Auteur | 2010 - 9th ed.

1, Financial statements : an overview. 2, The balance sheet. 3, Income statement and statement of stockholders' equity. 4, Statement of cash flows. 5, A guide to earnings and financial reproting quality. 6, The analysis of financi...

Introductory mathematical analysis : for business, economics, and the life and social sciences / Ernest F. Haeussler Jr., ..., Richard S. Paul, ..., Richard J. Wood, ... | Haeussler, Ernest F., Jr.. Auteur

Introductory mathematical analysis : for business, economics, and the life ...

Livre | Haeussler, Ernest F., Jr.. Auteur | 2019 - Fourteenth edition

Chargement des enrichissements...