NeuroEvolution automates the generation of Artificial Neural Networks through the application of techniques from Evolutionary Computation. The main goal of these approaches is to build models that maximize predictive performance, sometimes with an additional objective of minimizing computational complexity. Although the evolved models achieve competitive results performance-wise, their robustness to adversarial examples, which becomes a concern in security-critical scenarios, has received limited attention. In this paper, we evaluate the adversarial robustness of models found by two prominent NeuroEvolution approaches on the CIFAR-10 image classification task: DENSER and NSGA-Net. Since the models are publicly available, we consider white-box untargeted attacks, where the perturbations are bounded by either the L2 or the Linfinity-norm. Similarly to manually-designed networks, our results show that when the evolved models are attacked with iterative methods, their accuracy usually drops to, or close to, zero under both distance metrics. The DENSER model is an exception to this trend, showing some resistance under the L2 threat model, where its accuracy only drops from 93.70% to 18.10% even with iterative attacks. Additionally, we analyzed the impact of pre-processing applied to the data before the first layer of the network. Our observations suggest that some of these techniques can exacerbate the perturbations added to the original inputs, potentially harming robustness. Thus, this choice should not be neglected when automatically designing networks for applications where adversarial attacks are prone to occur.
翻译:神经进化使人造神经网络的生成自动化。 这些方法的主要目标是通过应用进化计算法的技术来建立能够最大限度地提高预测性能的模型,有时还有将计算复杂性降到最低的附加目标。 虽然进化模型在竞争性结果性能方面实现了竞争力性能,但它们对竞争性实例的稳健性却受到了有限的关注。 在本文件中,我们评估了在CIFAR-10图像分类任务(DENSER和NSGA-Net)中两种突出的神经进化方法发现的模式的对抗性强性。由于模型是公开的,我们考虑的是白箱非目标性应用程序,在这些模型中,扰动性受到L2或Linfinity-Norm的束缚。与人工设计的网络类似,我们的结果表明,在进化模型受到迭代方法攻击时,其准确性通常下降到或接近于两种距离度的零。 DENSER模式是这一趋势的例外,表明L2威胁下存在一些阻力,在L2模型下,其选择性应用程序的准确性不是为93.70 %,在网络之前,我们只能将原始的进度观测结果推至18.10,因此,因此,这些变压技术可以分析这些变压。 这些变压。 这些变压技术。 这些变压。 这些变压。