ial examples from new input images with a low com-
putational cost. Their method has the generalization
ability, which is not supported by most of the exist-
ing methods.
DeepCheck (Gopinath et al., 2019) is the first
symbolic execution tool for testing DNNs. This
method translates a DNN into a Java program. From
an input image, the program is instrumented and exe-
cuted to get the execution path. After that, symbolic
execution is applied on this path to obtain path con-
straints. These path constraints are modified by fixing
a set of features. The modified constraints are solved
by using an SMT-Solver such as Z3 (De Moura and
Bjørner, 2008) to get a solution. This method could
generate an adversarial example with a very small L
0
-
norm. However, this method consumes a large com-
putational cost due to the symbolic execution and the
usage of SMT-Solvers.
Adversarial Example Improvement. To the best
of our knowledge, most works in this field do not
consider the improvement of adversarial examples as
an independent phase. Instead, they add the objec-
tive of L
p
-norm minimization to the objective func-
tion such as box-constrained L-BFGS (Szegedy et al.,
2014), Carnili-Wagner (Carlini and Wagner, 2016),
ATN (Baluja and Fischer, 2017), etc. Our method
could be considered as the second phase of the ad-
versarial example generation methods. The proposed
method could be used to enhance the quality of adver-
sarial examples generated by any attack.
8 CONCLUSION
We have presented a method to improve the qual-
ity of adversarial examples in terms of L
0
-norm and
L
2
-norm. The proposed method includes two phases
namely the autoencoder training phase and the im-
provement phase. In the autoencoder training phase,
the proposed method trains an autoencoder to learn
how to detect redundantly adversarial features. In
the improvement phase, the autoencoder improves the
quality of a new adversarial example to generate the
first version of the improvement. After that, the first
improvement version is fed into the greedy improve-
ment step to enhance more. The experiments are
conducted on the MNIST dataset and the CIFAR-10
dataset. The proposed method could enhance the L
0
-
norm and L
2
-norm significantly. Additionally, the
proposed method could improve the quality of new
adversarial examples with a low computational cost.
It means that the proposed method could be applied
in practice.
In the future, we would investigate more deeply
the impact of high-quality adversarial examples on
the performance of the adversarial defence. Be-
sides, we would evaluate the effectiveness of the pro-
posed method with different kinds of autoencoder
such as denoising autoencoder, sparse autoencoder,
variational autoencoder, symmetric autoencoder, etc.
Finally, we would investigate the effectiveness of
the proposed method with the adversarial examples
generated by other methods such as Carnili-Wagner,
DeepFool, DeepCheck, etc.
ACKNOWLEDGEMENTS
This work has been supported by VNU University
of Engineering and Technology under project number
CN21.09.
Duc-Anh Nguyen was funded by Vingroup JSC
and supported by the Master, PhD Scholarship Pro-
gramme of Vingroup Innovation Foundation (VINIF),
Institute of Big Data, code VINIF.2021.TS.105.
Kha Do Minh was funded by Vingroup JSC
and supported by the Master, PhD Scholarship Pro-
gramme of Vingroup Innovation Foundation (VINIF),
Institute of Big Data, code VINIF.2021.ThS.24.
REFERENCES
Baluja, S. and Fischer, I. (2017). Adversarial transformation
networks: Learning to generate adversarial examples.
Carlini, N. and Wagner, D. A. (2016). Towards eval-
uating the robustness of neural networks. CoRR,
abs/1608.04644.
Ciregan, D., Meier, U., and Schmidhuber, J. (2012). Multi-
column deep neural networks for image classification.
In 2012 IEEE Conference on Computer Vision and
Pattern Recognition, pages 3642–3649.
De Moura, L. and Bjørner, N. (2008). Z3: An efficient smt
solver. In Proceedings of the Theory and Practice of
Software, 14th International Conference on Tools and
Algorithms for the Construction and Analysis of Sys-
tems, TACAS’08/ETAPS’08, pages 337–340, Berlin,
Heidelberg. Springer-Verlag.
Eniser, H. F., Gerasimou, S., and Sen, A. (2019). Deepfault:
Fault localization for deep neural networks. CoRR,
abs/1902.05974.
Goodfellow, I. J., Shlens, J., and Szegedy, C. (2015). Ex-
plaining and harnessing adversarial examples.
Gopinath, D., P
˘
as
˘
areanu, C. S., Wang, K., Zhang, M., and
Khurshid, S. (2019). Symbolic execution for attribu-
tion and attack synthesis in neural networks. In Pro-
ceedings of the 41st International Conference on Soft-
ware Engineering: Companion Proceedings, ICSE
’19, page 282–283. IEEE Press.
ICAART 2022 - 14th International Conference on Agents and Artificial Intelligence
224