Adversarial patch detection
Digital twinning, a fundamental method used in the Metaverse, allows for the virtualization of people, real-world landscapes, and objects. Using machine learning algorithms to process large amounts of data, digital twins can simulate and make decisions based on users’ actions in the physical world....
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/162907 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-162907 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1629072022-11-14T01:55:01Z Adversarial patch detection Yeong, Joash Ler Yuen Jun Zhao School of Computer Science and Engineering junzhao@ntu.edu.sg Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Digital twinning, a fundamental method used in the Metaverse, allows for the virtualization of people, real-world landscapes, and objects. Using machine learning algorithms to process large amounts of data, digital twins can simulate and make decisions based on users’ actions in the physical world. However, the security of these technologies may be jeopardised in the face of adversarial attacks. By introducing adversarial patches that distort perceived data, deep learning models can produce inaccurate predictions. Hence, we focused on a setting where users on the Internet of Vehicles (IoV) are capturing views of the virtual world in real time and identifying these adversarial patches. Unfortunately, the lack of strong computational capacity makes it impractical for IoV sensors to run adversarial patch detection. In this paper, we came up with an edge orchestrator by using deep reinforcement learning to offload the task of detecting adversarial patches to systems that are good at computing while easing the trade-off between accuracy and latency. Experiments were done to show that our proposed system and algorithms work well and are efficient. Bachelor of Engineering (Computer Science) 2022-11-14T01:55:00Z 2022-11-14T01:55:00Z 2022 Final Year Project (FYP) Yeong, J. L. Y. (2022). Adversarial patch detection. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/162907 https://hdl.handle.net/10356/162907 en SCSE21-0834 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence |
spellingShingle |
Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence Yeong, Joash Ler Yuen Adversarial patch detection |
description |
Digital twinning, a fundamental method used in the Metaverse, allows for the virtualization of people, real-world landscapes, and objects. Using machine learning algorithms to process large amounts of data, digital twins can simulate and make decisions based on users’ actions in the physical world. However, the security of these technologies may be jeopardised in the face of adversarial attacks. By introducing adversarial patches that distort perceived data, deep learning models can produce inaccurate predictions. Hence, we focused on a setting where users on the Internet of Vehicles (IoV) are capturing views of the virtual world in real time and identifying these adversarial patches. Unfortunately, the lack of strong computational capacity makes it impractical for IoV sensors to run adversarial patch detection. In this paper, we came up with an edge orchestrator by using deep reinforcement learning to offload the task of detecting adversarial patches to systems that are good at computing while easing the trade-off between accuracy and latency. Experiments were done to show that our proposed system and algorithms work well and are efficient. |
author2 |
Jun Zhao |
author_facet |
Jun Zhao Yeong, Joash Ler Yuen |
format |
Final Year Project |
author |
Yeong, Joash Ler Yuen |
author_sort |
Yeong, Joash Ler Yuen |
title |
Adversarial patch detection |
title_short |
Adversarial patch detection |
title_full |
Adversarial patch detection |
title_fullStr |
Adversarial patch detection |
title_full_unstemmed |
Adversarial patch detection |
title_sort |
adversarial patch detection |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/162907 |
_version_ |
1751548525810810880 |