- Notifications
You must be signed in to change notification settings - Fork1
Official Implementation of Paper "NOMARO: Defending against Adversarial Attacks by NOMA-Inspired Reconstruction Operation"
License
as791/NOMARO_defense
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Link:https://ieeexplore.ieee.org/document/9650591
In this work, a non-orthogonal multiple access (NOMA)-inspired defense method is proposed to mitigate the effect of adversarial attacks, which pose a major challenge towards deep neural networks (DNNs) in multimedia networks. The novel defense method, namely NOMA-inspired reconstruction operation (NOMARO), incorporates a copy of the input image generated by applying the untargeted adversarial attack. The copy and input images are superposed with a power allocation factor inversely proportional to the correlation between the considered images. To the best of our knowledge, this is the first communication theory based approach to design an adversarial defense method to be useful in multimedia applications. A comparative study with the existing defense techniques shows the superior performance of the proposed NOMARO defense against the state-of-the-art C&W and Square attacks in white-box and black-box settings, respectively, on popular DNN models.
- Python 3.6
- TensorFlow 2.x
- MATLAB 2021a
Do you have any problem or doubts please raise the issue or directly contact toAryaman Sinha
@ARTICLE{9650591, author={Sinha, Aryaman and Dash, Soumya P. and Puhan, Niladri B.}, journal={IEEE Sensors Letters}, title={NOMARO: Defending Against Adversarial Attacks by NOMA-Inspired Reconstruction Operation}, year={2022}, volume={6}, number={1}, pages={1-4}, doi={10.1109/LSENS.2021.3135433}}