pith. sign in

arxiv: 1803.03870 · v3 · pith:GEHMMSNSnew · submitted 2018-03-11 · 💻 cs.LG

Detecting Adversarial Examples via Neural Fingerprinting

classification 💻 cs.LG
keywords neuralfingerprintingadversarialfingerprintsexamplesmodelsdetectingdetection
0
0 comments X p. Extension
pith:GEHMMSNS Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{GEHMMSNS}

Prints a linked pith:GEHMMSNS badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Deep neural networks are vulnerable to adversarial examples, which dramatically alter model output using small input changes. We propose Neural Fingerprinting, a simple, yet effective method to detect adversarial examples by verifying whether model behavior is consistent with a set of secret fingerprints, inspired by the use of biometric and cryptographic signatures. The benefits of our method are that 1) it is fast, 2) it is prohibitively expensive for an attacker to reverse-engineer which fingerprints were used, and 3) it does not assume knowledge of the adversary. In this work, we pose a formal framework to analyze fingerprints under various threat models, and characterize Neural Fingerprinting for linear models. For complex neural networks, we empirically demonstrate that Neural Fingerprinting significantly improves on state-of-the-art detection mechanisms by detecting the strongest known adversarial attacks with 98-100% AUC-ROC scores on the MNIST, CIFAR-10 and MiniImagenet (20 classes) datasets. In particular, the detection accuracy of Neural Fingerprinting generalizes well to unseen test-data under various black- and whitebox threat models, and is robust over a wide range of hyperparameters and choices of fingerprints.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Copyright Protection for Large Language Models: A Survey of Methods, Challenges, and Trends

    cs.CR 2025-08 accept novelty 7.0

    A survey of LLM copyright protection that unifies text watermarking, model watermarking, and model fingerprinting while presenting new coverage of fingerprint transfer and removal.

  2. Towards Reliable Forgetting: A Survey on Machine Unlearning Verification

    cs.LG 2025-06 unverdicted novelty 6.0

    A survey that organizes machine unlearning verification methods into behavioral and parametric categories and outlines open problems.