Log-normal Mutations and their Use in Detecting Surreptitious Fake Images

Ismail Labiad,Thomas Bäck,Pierre Fernandez,Laurent Najman,Tom Sander,Furong Ye,Mariia Zameshina,Olivier Teytaud
2024-09-25
Abstract:In many cases, adversarial attacks are based on specialized algorithms specifically dedicated to attacking automatic image classifiers. These algorithms perform well, thanks to an excellent ad hoc distribution of initial attacks. However, these attacks are easily detected due to their specific initial distribution. We therefore consider other black-box attacks, inspired from generic black-box optimization tools, and in particular the log-normal algorithm. We apply the log-normal method to the attack of fake detectors, and get successful attacks: importantly, these attacks are not detected by detectors specialized on classical adversarial attacks. Then, combining these attacks and deep detection, we create improved fake detectors.
Artificial Intelligence
What problem does this paper attempt to address?