DARD: Dice Adversarial Robustness Distillation against Adversarial Attacks
By: Jing Zou , Shungeng Zhang , Meikang Qiu and more
Potential Business Impact:
Makes AI smarter and safer from tricks.
Deep learning models are vulnerable to adversarial examples, posing critical security challenges in real-world applications. While Adversarial Training (AT ) is a widely adopted defense mechanism to enhance robustness, it often incurs a trade-off by degrading performance on unperturbed, natural data. Recent efforts have highlighted that larger models exhibit enhanced robustness over their smaller counterparts. In this paper, we empirically demonstrate that such robustness can be systematically distilled from large teacher models into compact student models. To achieve better performance, we introduce Dice Adversarial Robustness Distillation (DARD), a novel method designed to transfer robustness through a tailored knowledge distillation paradigm. Additionally, we propose Dice Projected Gradient Descent (DPGD), an adversarial example generalization method optimized for effective attack. Our extensive experiments demonstrate that the DARD approach consistently outperforms adversarially trained networks with the same architecture, achieving superior robustness and standard accuracy.
Similar Papers
ProARD: progressive adversarial robustness distillation: provide wide range of robust students
Machine Learning (CS)
Trains one smart computer to help many others.
CIARD: Cyclic Iterative Adversarial Robustness Distillation
CV and Pattern Recognition
Makes AI smarter and safer, even when tricked.
MMARD: Improving the Min-Max Optimization Process in Adversarial Robustness Distillation
CV and Pattern Recognition
Makes small computer brains smarter and safer.