/NOMARO_defense

Official Implementation of Paper "NOMARO: Defending against Adversarial Attacks by NOMA-Inspired Reconstruction Operation"

Primary LanguagePythonMIT LicenseMIT

NOMARO: Defending against Adversarial Attacks by NOMA-Inspired Reconstruction Operation

IEEE Sensors Letters

Aryaman Sinha, Soumya P. Dash, N. B. Puhan

Indian Institute of Technology Bhubaneswar

Link: https://ieeexplore.ieee.org/document/9650591

Abstract

In this work, a non-orthogonal multiple access (NOMA)-inspired defense method is proposed to mitigate the effect of adversarial attacks, which pose a major challenge towards deep neural networks (DNNs) in multimedia networks. The novel defense method, namely NOMA-inspired reconstruction operation (NOMARO), incorporates a copy of the input image generated by applying the untargeted adversarial attack. The copy and input images are superposed with a power allocation factor inversely proportional to the correlation between the considered images. To the best of our knowledge, this is the first communication theory based approach to design an adversarial defense method to be useful in multimedia applications. A comparative study with the existing defense techniques shows the superior performance of the proposed NOMARO defense against the state-of-the-art C&W and Square attacks in white-box and black-box settings, respectively, on popular DNN models.

Approach

Screenshot 2021-12-21 at 21 03 49

Requirements

  • Python 3.6
  • TensorFlow 2.x
  • MATLAB 2021a

Results

Screenshot 2021-12-21 at 21 04 53

Screenshot 2021-12-21 at 21 06 02

Screenshot 2021-12-21 at 21 05 26

Contact

Do you have any problem or doubts please raise the issue or directly contact to Aryaman Sinha

Citation

@ARTICLE{9650591,  
author={Sinha, Aryaman and Dash, Soumya P. and Puhan, Niladri B.},  
journal={IEEE Sensors Letters}, 
title={NOMARO: Defending Against Adversarial Attacks by NOMA-Inspired Reconstruction Operation}, 
year={2022},  
volume={6}, 
number={1}, 
pages={1-4},  
doi={10.1109/LSENS.2021.3135433}}