Inicio  /  Applied Sciences  /  Vol: 11 Par: 9 (2021)  /  Artículo
ARTÍCULO
TITULO

Vulnerability in Deep Transfer Learning Models to Adversarial Fast Gradient Sign Attack for COVID-19 Prediction from Chest Radiography Images

Biprodip Pal    
Debashis Gupta    
Md. Rashed-Al-Mahfuz    
Salem A. Alyami and Mohammad Ali Moni    

Resumen

The COVID-19 pandemic requires the rapid isolation of infected patients. Thus, high-sensitivity radiology images could be a key technique to diagnose patients besides the polymerase chain reaction approach. Deep learning algorithms are proposed in several studies to detect COVID-19 symptoms due to the success in chest radiography image classification, cost efficiency, lack of expert radiologists, and the need for faster processing in the pandemic area. Most of the promising algorithms proposed in different studies are based on pre-trained deep learning models. Such open-source models and lack of variation in the radiology image-capturing environment make the diagnosis system vulnerable to adversarial attacks such as fast gradient sign method (FGSM) attack. This study therefore explored the potential vulnerability of pre-trained convolutional neural network algorithms to the FGSM attack in terms of two frequently used models, VGG16 and Inception-v3. Firstly, we developed two transfer learning models for X-ray and CT image-based COVID-19 classification and analyzed the performance extensively in terms of accuracy, precision, recall, and AUC. Secondly, our study illustrates that misclassification can occur with a very minor perturbation magnitude, such as 0.009 and 0.003 for the FGSM attack in these models for X-ray and CT images, respectively, without any effect on the visual perceptibility of the perturbation. In addition, we demonstrated that successful FGSM attack can decrease the classification performance to 16.67% and 55.56% for X-ray images, as well as 36% and 40% in the case of CT images for VGG16 and Inception-v3, respectively, without any human-recognizable perturbation effects in the adversarial images. Finally, we analyzed that correct class probability of any test image which is supposed to be 1, can drop for both considered models and with increased perturbation; it can drop to 0.24 and 0.17 for the VGG16 model in cases of X-ray and CT images, respectively. Thus, despite the need for data sharing and automated diagnosis, practical deployment of such program requires more robustness.

 Artículos similares

       
 
Marinela del Carmen Valencia Giraldo, Simon Ricard and François Anctil    
There is currently much discussion as to whether probabilistic (top?down) or possibilistic (bottom?up) approaches are the most appropriate to estimate potential future climate impacts. In a context of deep uncertainty, such as future climate, bottom-up a... ver más
Revista: Water

 
Chaloemporn Ponprasit, Yong Zhang, Xiufen Gu, Andrew M. Goodliffe and Hongguang Sun    
Groundwater vulnerability assessment helps subsurface water resources management by providing scientific information for decision-makers. Rigorous, quantitative assessment of groundwater vulnerability usually requires process-based approaches such as gro... ver más
Revista: Water

 
MoonSun Shin, Seonmin Hwang, Junghwan Kim, Byungcheol Kim and Jeong-Sung Jung    
According to the climate change scenario, climate change in the Korean Peninsula is expected to worsen due to extreme temperatures, with effects such as rising average temperatures, heat waves, and droughts. In Republic of Korea, which relies on foreign ... ver más
Revista: Applied Sciences

 
Kazuki Koga and Kazuhiro Takemoto    
Universal adversarial attacks, which hinder most deep neural network (DNN) tasks using only a single perturbation called universal adversarial perturbation (UAP), are a realistic security threat to the practical application of a DNN for medical imaging. ... ver más
Revista: Algorithms

 
Milad Memarzadeh, Ata Akbari Asanjan and Bryan Matthews    
Identifying safety anomalies and vulnerabilities in the aviation domain is a very expensive and time-consuming task. Currently, it is accomplished via manual forensic reviews by subject matter experts (SMEs). However, with the increase in the amount of d... ver más
Revista: Aerospace