Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Adversarial Attack Vulnerability of Medical Image Analysis Systems: Unexplored Factors (2006.06356v3)

Published 11 Jun 2020 in cs.CR, cs.CV, and eess.IV

Abstract: Adversarial attacks are considered a potentially serious security threat for machine learning systems. Medical image analysis (MedIA) systems have recently been argued to be vulnerable to adversarial attacks due to strong financial incentives and the associated technological infrastructure. In this paper, we study previously unexplored factors affecting adversarial attack vulnerability of deep learning MedIA systems in three medical domains: ophthalmology, radiology, and pathology. We focus on adversarial black-box settings, in which the attacker does not have full access to the target model and usually uses another model, commonly referred to as surrogate model, to craft adversarial examples. We consider this to be the most realistic scenario for MedIA systems. Firstly, we study the effect of weight initialization (ImageNet vs. random) on the transferability of adversarial attacks from the surrogate model to the target model. Secondly, we study the influence of differences in development data between target and surrogate models. We further study the interaction of weight initialization and data differences with differences in model architecture. All experiments were done with a perturbation degree tuned to ensure maximal transferability at minimal visual perceptibility of the attacks. Our experiments show that pre-training may dramatically increase the transferability of adversarial examples, even when the target and surrogate's architectures are different: the larger the performance gain using pre-training, the larger the transferability. Differences in the development data between target and surrogate models considerably decrease the performance of the attack; this decrease is further amplified by difference in the model architecture. We believe these factors should be considered when developing security-critical MedIA systems planned to be deployed in clinical practice.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (12)
  1. Gerda Bortsova (14 papers)
  2. Cristina González-Gonzalo (5 papers)
  3. Suzanne C. Wetstein (3 papers)
  4. Florian Dubost (35 papers)
  5. Ioannis Katramados (6 papers)
  6. Laurens Hogeweg (4 papers)
  7. Bart Liefers (5 papers)
  8. Bram van Ginneken (69 papers)
  9. Josien P. W. Pluim (39 papers)
  10. Mitko Veta (39 papers)
  11. Marleen De Bruijne (53 papers)
  12. Clara I. Sánchez (19 papers)

Summary

We haven't generated a summary for this paper yet.