Depth map convolution model defense method based on generative adversarial network

A convolution model and depth map technology, applied in the field of network security, can solve problems such as difficult to guarantee the effectiveness of defense, and achieve the effects of enhancing robustness, defending against attacks, and improving accuracy

Inactive Publication Date: 2021-01-29
ZHEJIANG UNIV OF TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in most cases, this randomness is difficult to guarantee the effectiveness of the defense. How to more targetedly defend against the adversary's attack on the network, improve the robustness of the depth map convolution model, and improve the performance of downstream tasks has important practical significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Depth map convolution model defense method based on generative adversarial network
  • Depth map convolution model defense method based on generative adversarial network
  • Depth map convolution model defense method based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0020] In order to enhance the robustness of deep graph convolutional models for classification tasks or recognition tasks of social networks, communication networks, biological networks or transaction networks to adversarial attacks, to improve the accuracy of classification tasks or recognition tasks. The embodiment provides a method for defending a deep graph convolution model based on a generative confrontation network, such as figure 1 As shown, the depth map convolution model defense method includes the following steps:

[0021] Step 1, build a multi-strategy gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a depth map convolution model defense method based on a generative adversarial network. The method comprises the steps: (1) building a multi-strategy generator and a similaritydiscriminator based on the generative adversarial network, wherein the multi-strategy generator comprises a graph feature extractor for extracting low-dimensional embedded features of an original graph sample and a graph reconstructor for reconstructing an adversarial graph sample based on the low-dimensional embedded features and a dimension expansion matrix, and the similarity judger is used for judging the real probability of the input image sample; (2) performing adversarial iterative training on the multi-strategy generator and the similarity discriminator to generate an adversarial graph sample which has an attack disturbance effect and is highly similar to the original graph sample; (3) constructing a defense classifier based on the graph convolution network, performing pre-training and defense training on the defense classification model by utilizing the original graph sample and the adversarial graph sample, and taking the defense classifier after training as a final defensemodel; (4) inputting the graph sample into a final defense model to realize identification and classification tasks with defense and countermeasure attacks.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a defense method of a deep graph convolution model based on a generative confrontation network. Background technique [0002] Modern life is surrounded by various network data, which are used to represent data in many fields, such as social network, communication network, biological network, transaction network, etc. In order to express complex and diverse network data in an intuitive data form, researchers mostly describe network data in the form of graph data. Graph embedding methods map the node and edge information in a graph to a low-dimensional Euclidean space, thereby enabling graph analysis tasks in the real world. Deep graph convolutional models, one of the most successful graph embedding methods, have shown encouraging results in various applications, such as node classification, graph classification, link prediction, and community detection. Low-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06N3/04G06N3/08
CPCG06N3/08G06N3/045G06F18/22G06F18/2415G06F18/214
Inventor 陈晋音张敦杰贾澄钰林翔李玉玮
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products