SlideShare a Scribd company logo
IMPACT OF ADVERSARIAL EXAMPLES ON DEEP LEARNING MODELS
FOR BIOMEDICAL IMAGE SEGMENTATION
Utku Ozbulak1,3
, Arnout Van Messem2,3
, Wesley De Neve1,3
1
Department of Electronics and Information Systems, Ghent University, Belgium
2
Department of Applied Mathematics, Computer Science and Statistics, Ghent University, Belgium
3
Center for Biotech Data Science,Ghent University Global Campus, South Korea
Abstract
Deep learning models, which are
increasingly being used in the field
of medical image analysis, come
with a major security risk, namely,
their vulnerability to adversarial
examples. Given that a large
portion of medical imaging prob-
lems are effectively segmentation
problems, we analyze the impact
of adversarial examples on deep
learning models for biomedical im-
age segmentation. We expose the
vulnerability of these models to
adversarial examples by propos-
ing a novel algorithm, namely,
the Adaptive Segmentation Mask
Attack (ASMA). This algorithm
makes it possible to craft targeted
adversarial examples that come
with high Intersection-over-Union
rates between the target adversar-
ial mask and the prediction, as well
as with perturbation that is mostly
invisible to the bare eye.
Motivation
Given that (1) labor expenses (i.e.,
salaries of nurses, doctors, and
other relevant personnel) are a key
driver of high costs in the medical
field and (2) that increasingly
super-human results are obtained
by machine learning systems, an
ongoing discussion is to replace
or augment manual labor with
automation for a number of medical
diagnosis tasks [1]. However, a
recent development called adver-
sarial examples showed that deep
learning models are vulnerable to
gradient-based attacks [2]. This
vulnerability, which is considered
a major security flaw, for instance
enables the creation of fraud
schemes (e.g., for insurance claims)
when deep learning models are
carrying out clinical tasks [1].
The above observations motivate
our effort to better understand the
impact of adversarial examples on
deep learning approaches towards
biomedical image segmentation, so
to facilitate the secure deployment
of deep learning models during
clinical tasks.
References
[1] Finlayson S.G., Chung H.W., Kohane I.S., Beam A.L.,
Adversarial Attacks Against Medical Deep Learning Systems
[2] Szegedy C., Zaremba W., Sutskever I., Bruna J., Erhan D., Goodfellow I., Fergus R.,
Intriguing Properties of Neural Networks
[3] Pena-Betancor C., Gonzalez-Hernandez M., Fumero-Batista F., Sigut J., Medina-Mesa E., Alayon S., de la Rosa M.,
Estimation of the Relative Amount of Hemoglobin in the Cup and Neuroretinal Rim using Stereoscopic Color Fundus Images
[4] Gutman D., Codella N., Celebi M., Helba B., Marchetti M., Mishra N., Halpern A.,
Skin Lesion Analysis toward Melanoma Detection
[5] Ronneberger O., Fischer P., Brox T.,
U-Net: Convolutional Networks for Biomedical Image Segmentation
Biotech Data Science
Center for
Adaptive Segmentation Mask Attack
Adversarial examples are malicious data points that force machine learning models to make mistakes during
testing time [2].
+ 0.01× =
Genuine Image
Prediction: Cancer
Confidence: 0.95
Perturbation
(Enhanced × 100 )
Adversarial Example
Prediction: Healthy
Confidence: 0.99
By introducing a novel algorithm for producing targeted adversarial examples for image segmentation problems,
we expose the vulnerability of deep learning models for biomedical image segmentation to malicious data points.
Our algorithm, named Adaptive Segmentation Mask Attack (ASMA), incorporates two techniques, namely, the
use of (1) adaptive segmentation masks and (2) dynamic perturbation multipliers. The proposed attack is defined
as follows:
X : Input image.
g(θ, X) : Forward pass from a neural
network g with parameters θ using input X.
YA
: Target (adversarial) mask.
Pn : Added perturbation at nth iteration.
minimize || X − (X + P) ||2 ,
such that arg max g(θ, (X + P)) = YA
, (X + P) ∈ [0, 1]z
,
Pn =
M−1
c=0
x g(θ, Xn)c 1{YA = c} 1{arg maxM (g(θ,Xn)) = c} .
ASMA is able to craft adversarial examples with 97% and 89% Intersection-over-Union (IoU) accuracy for the
Glaucoma Dataset [3] and the ISIC Skin Lesion Dataset [4], respectively, with IoU measured between the pre-
dicted segmentation for a given adversarial example and the corresponding target mask. While doing so, our
algorithm modifies the image so subtly that the perturbations, for the most part, are not visible to the bare eye.
+ =
Segmentation
Mask of (a)
(a) Source
Image
Generated
Perturbation
(Enhanced × 100)
Generated
Adversarial Example
L2 = 2.3, L∞ = 0.16
Segmentation
Mask of (b)
(Target Mask)
(b) Target
Image
Adaptive
Optimization
Masks
Predicted
Segmentation for the
Adversarial Example
IoU = 98%, PA = 99%
Using ASMA, results obtained for the two above-mentioned biomedical datasets (mean and standard deviation)
are provided in the table below (PA denotes Pixel Accuracy).
Glaucoma Dataset ISIC Skin Lesion Dataset
Modification Accuracy Modification Accuracy
Optimization L2 L∞ IoU PA L2 L∞ IoU PA
ASMA
2.47 0.17 97% 99% 3.88 0.16 89% 98%
±1.05 ±0.09 ±2% ±1% ±1.99 ±0.09 ±10% ±1%
* The experiments presented above are conducted in white-box settings, using the U-Net architecture [5].

More Related Content

What's hot (16)

Geometric Correction for Braille Document Images
Geometric Correction for Braille Document Images  Geometric Correction for Braille Document Images
Geometric Correction for Braille Document Images
csandit
 
FYP
FYPFYP
FYP
Kang Shu Zhen
 
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENT
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENTA GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENT
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENT
pharmaindexing
 
A review deep learning for medical image segmentation using multi modality fu...
A review deep learning for medical image segmentation using multi modality fu...A review deep learning for medical image segmentation using multi modality fu...
A review deep learning for medical image segmentation using multi modality fu...
Aykut DİKER
 
B0343011014
B0343011014B0343011014
B0343011014
ijceronline
 
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...
idescitation
 
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...
csandit
 
40120130406009
4012013040600940120130406009
40120130406009
IAEME Publication
 
A comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataA comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray data
ijcsit
 
Image segmentation by modified map ml estimations
Image segmentation by modified map ml estimationsImage segmentation by modified map ml estimations
Image segmentation by modified map ml estimations
ijesajournal
 
C013141723
C013141723C013141723
C013141723
IOSR Journals
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imaging
eSAT Publishing House
 
local_learning.doc - Word Format
local_learning.doc - Word Formatlocal_learning.doc - Word Format
local_learning.doc - Word Format
butest
 
Ijnsa050202
Ijnsa050202Ijnsa050202
Ijnsa050202
IJNSA Journal
 
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationUNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
TELKOMNIKA JOURNAL
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...
IAEME Publication
 
Geometric Correction for Braille Document Images
Geometric Correction for Braille Document Images  Geometric Correction for Braille Document Images
Geometric Correction for Braille Document Images
csandit
 
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENT
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENTA GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENT
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENT
pharmaindexing
 
A review deep learning for medical image segmentation using multi modality fu...
A review deep learning for medical image segmentation using multi modality fu...A review deep learning for medical image segmentation using multi modality fu...
A review deep learning for medical image segmentation using multi modality fu...
Aykut DİKER
 
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...
idescitation
 
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...
csandit
 
A comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray dataA comparative study of clustering and biclustering of microarray data
A comparative study of clustering and biclustering of microarray data
ijcsit
 
Image segmentation by modified map ml estimations
Image segmentation by modified map ml estimationsImage segmentation by modified map ml estimations
Image segmentation by modified map ml estimations
ijesajournal
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imaging
eSAT Publishing House
 
local_learning.doc - Word Format
local_learning.doc - Word Formatlocal_learning.doc - Word Format
local_learning.doc - Word Format
butest
 
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationUNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
TELKOMNIKA JOURNAL
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...
IAEME Publication
 

Similar to Impact of adversarial examples on deep learning models for biomedical image segmentation (20)

Adversarial attack driven data augmentation for medical images
Adversarial attack driven data augmentation for medical imagesAdversarial attack driven data augmentation for medical images
Adversarial attack driven data augmentation for medical images
IJECEIAES
 
Defending deep learning from adversarial attacks
Defending deep learning from adversarial attacksDefending deep learning from adversarial attacks
Defending deep learning from adversarial attacks
Svetlana Levitan, PhD
 
Generative Adversarial Networks for Robust Medical Image Analysis.pdf
Generative Adversarial Networks for Robust Medical Image Analysis.pdfGenerative Adversarial Networks for Robust Medical Image Analysis.pdf
Generative Adversarial Networks for Robust Medical Image Analysis.pdf
Daniel983829
 
Miccai2018 paperlist
Miccai2018 paperlistMiccai2018 paperlist
Miccai2018 paperlist
Kevin Zhou
 
Robustness in deep learning
Robustness in deep learningRobustness in deep learning
Robustness in deep learning
Ganesan Narayanasamy
 
(20180728) kosaim workshop vuno - kyuhwan jung
(20180728) kosaim workshop   vuno - kyuhwan jung(20180728) kosaim workshop   vuno - kyuhwan jung
(20180728) kosaim workshop vuno - kyuhwan jung
Kyuhwan Jung
 
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
AkhileshPandey104
 
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...
ijmitjournal
 
Modelling Probability Distributions using Neural Networks: Applications to Me...
Modelling Probability Distributions using Neural Networks: Applications to Me...Modelling Probability Distributions using Neural Networks: Applications to Me...
Modelling Probability Distributions using Neural Networks: Applications to Me...
Christian Baumgartner
 
Adversarial examples in deep learning (Gregory Chatel)
Adversarial examples in deep learning (Gregory Chatel)Adversarial examples in deep learning (Gregory Chatel)
Adversarial examples in deep learning (Gregory Chatel)
MeetupDataScienceRoma
 
Universal Adversarial Perturbation
Universal Adversarial PerturbationUniversal Adversarial Perturbation
Universal Adversarial Perturbation
Hyunwoo Kim
 
Detecting adversarials examples attacks to deep neural networks
Detecting adversarials examples attacks to deep neural networksDetecting adversarials examples attacks to deep neural networks
Detecting adversarials examples attacks to deep neural networks
Fabio Carrara
 
Dark Side and Bright Side of AI in Medicine
Dark Side and Bright Side of AI in MedicineDark Side and Bright Side of AI in Medicine
Dark Side and Bright Side of AI in Medicine
University of Florida
 
Generational Adversarial Neural Networks - Essential Reference
Generational Adversarial Neural Networks - Essential ReferenceGenerational Adversarial Neural Networks - Essential Reference
Generational Adversarial Neural Networks - Essential Reference
Gokul Alex
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Medically applied artificial intelligence from bench to bedside
Medically applied artificial intelligence from bench to bedsideMedically applied artificial intelligence from bench to bedside
Medically applied artificial intelligence from bench to bedside
https://www.facebook.com/garmentspace
 
Presentation about adversarial image attacks
Presentation about adversarial image attacksPresentation about adversarial image attacks
Presentation about adversarial image attacks
KoshinKhodiyar
 
Dx25751756
Dx25751756Dx25751756
Dx25751756
IJERA Editor
 
Adversarial ML - Part 2.pdf
Adversarial ML - Part 2.pdfAdversarial ML - Part 2.pdf
Adversarial ML - Part 2.pdf
KSChidanandKumarJSSS
 
Adversarial attack driven data augmentation for medical images
Adversarial attack driven data augmentation for medical imagesAdversarial attack driven data augmentation for medical images
Adversarial attack driven data augmentation for medical images
IJECEIAES
 
Defending deep learning from adversarial attacks
Defending deep learning from adversarial attacksDefending deep learning from adversarial attacks
Defending deep learning from adversarial attacks
Svetlana Levitan, PhD
 
Generative Adversarial Networks for Robust Medical Image Analysis.pdf
Generative Adversarial Networks for Robust Medical Image Analysis.pdfGenerative Adversarial Networks for Robust Medical Image Analysis.pdf
Generative Adversarial Networks for Robust Medical Image Analysis.pdf
Daniel983829
 
Miccai2018 paperlist
Miccai2018 paperlistMiccai2018 paperlist
Miccai2018 paperlist
Kevin Zhou
 
(20180728) kosaim workshop vuno - kyuhwan jung
(20180728) kosaim workshop   vuno - kyuhwan jung(20180728) kosaim workshop   vuno - kyuhwan jung
(20180728) kosaim workshop vuno - kyuhwan jung
Kyuhwan Jung
 
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...
AkhileshPandey104
 
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...
ijmitjournal
 
Modelling Probability Distributions using Neural Networks: Applications to Me...
Modelling Probability Distributions using Neural Networks: Applications to Me...Modelling Probability Distributions using Neural Networks: Applications to Me...
Modelling Probability Distributions using Neural Networks: Applications to Me...
Christian Baumgartner
 
Adversarial examples in deep learning (Gregory Chatel)
Adversarial examples in deep learning (Gregory Chatel)Adversarial examples in deep learning (Gregory Chatel)
Adversarial examples in deep learning (Gregory Chatel)
MeetupDataScienceRoma
 
Universal Adversarial Perturbation
Universal Adversarial PerturbationUniversal Adversarial Perturbation
Universal Adversarial Perturbation
Hyunwoo Kim
 
Detecting adversarials examples attacks to deep neural networks
Detecting adversarials examples attacks to deep neural networksDetecting adversarials examples attacks to deep neural networks
Detecting adversarials examples attacks to deep neural networks
Fabio Carrara
 
Dark Side and Bright Side of AI in Medicine
Dark Side and Bright Side of AI in MedicineDark Side and Bright Side of AI in Medicine
Dark Side and Bright Side of AI in Medicine
University of Florida
 
Generational Adversarial Neural Networks - Essential Reference
Generational Adversarial Neural Networks - Essential ReferenceGenerational Adversarial Neural Networks - Essential Reference
Generational Adversarial Neural Networks - Essential Reference
Gokul Alex
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Presentation about adversarial image attacks
Presentation about adversarial image attacksPresentation about adversarial image attacks
Presentation about adversarial image attacks
KoshinKhodiyar
 
Ad

More from Wesley De Neve (20)

Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Wesley De Neve
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
Wesley De Neve
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Wesley De Neve
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
Wesley De Neve
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
Wesley De Neve
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
Wesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
Wesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
Wesley De Neve
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
Wesley De Neve
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
Wesley De Neve
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Wesley De Neve
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
Wesley De Neve
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Wesley De Neve
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Wesley De Neve
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Wesley De Neve
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Wesley De Neve
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Wesley De Neve
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
Wesley De Neve
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Wesley De Neve
 
Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...
Wesley De Neve
 
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...
Wesley De Neve
 
Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...Investigating the biological relevance in trained embedding representations o...
Investigating the biological relevance in trained embedding representations o...
Wesley De Neve
 
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Learning Biologically Relevant Features Using Convolutional Neural Networks f...
Wesley De Neve
 
The 5th Aslla Symposium
The 5th Aslla SymposiumThe 5th Aslla Symposium
The 5th Aslla Symposium
Wesley De Neve
 
Ghent University Global Campus 101
Ghent University Global Campus 101Ghent University Global Campus 101
Ghent University Global Campus 101
Wesley De Neve
 
Booklet for the First GUGC Research Symposium
Booklet for the First GUGC Research SymposiumBooklet for the First GUGC Research Symposium
Booklet for the First GUGC Research Symposium
Wesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
Wesley De Neve
 
Center for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global CampusCenter for Biotech Data Science at Ghent University Global Campus
Center for Biotech Data Science at Ghent University Global Campus
Wesley De Neve
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
Wesley De Neve
 
Towards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniquesTowards reading genomic data using deep learning-driven NLP techniques
Towards reading genomic data using deep learning-driven NLP techniques
Wesley De Neve
 
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...
Wesley De Neve
 
GUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and BioinformaticsGUGC Info Session - Informatics and Bioinformatics
GUGC Info Session - Informatics and Bioinformatics
Wesley De Neve
 
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Ghent University Global Campus - Sungkyunkwan University: Workshop on Researc...
Wesley De Neve
 
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesGhent University and GUGC-K: Overview of Teaching and Research Activities
Ghent University and GUGC-K: Overview of Teaching and Research Activities
Wesley De Neve
 
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...
Wesley De Neve
 
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
 Exploring Deep Machine Learning for Automatic Right Whale Recognition and No... Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Exploring Deep Machine Learning for Automatic Right Whale Recognition and No...
Wesley De Neve
 
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Deep Machine Learning for Automating Biotech Tasks Through Self-Learning Expe...
Wesley De Neve
 
Towards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processingTowards using multimedia technology for biological data processing
Towards using multimedia technology for biological data processing
Wesley De Neve
 
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...
Wesley De Neve
 
Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...Towards Twitter hashtag recommendation using distributed word representations...
Towards Twitter hashtag recommendation using distributed word representations...
Wesley De Neve
 
Ad

Recently uploaded (20)

Class 12 biology project on the topic cancer
Class 12 biology project on the topic cancerClass 12 biology project on the topic cancer
Class 12 biology project on the topic cancer
crazycompetitor000
 
Understanding Visualization Authoring for Genomics Data through User Interviews
Understanding Visualization Authoring for Genomics Data through User InterviewsUnderstanding Visualization Authoring for Genomics Data through User Interviews
Understanding Visualization Authoring for Genomics Data through User Interviews
sehilyi
 
AI for Program Specifications Berkeley May 2025.pdf
AI for Program Specifications Berkeley May 2025.pdfAI for Program Specifications Berkeley May 2025.pdf
AI for Program Specifications Berkeley May 2025.pdf
shuvendulahiri1
 
Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)
Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)
Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)
Dr.Devraj Neupane
 
Grammar-Based 
Interactive Visualization of Genomics Data
Grammar-Based 
Interactive Visualization of Genomics DataGrammar-Based 
Interactive Visualization of Genomics Data
Grammar-Based 
Interactive Visualization of Genomics Data
sehilyi
 
CULTIVATION - HARVESTING - PROCESSING - STORAGE -.pdf
CULTIVATION - HARVESTING - PROCESSING - STORAGE -.pdfCULTIVATION - HARVESTING - PROCESSING - STORAGE -.pdf
CULTIVATION - HARVESTING - PROCESSING - STORAGE -.pdf
Nistarini College, Purulia (W.B) India
 
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...
DrJamesFarley
 
Morphological and biochemical characterization in Rice
Morphological and biochemical characterization in RiceMorphological and biochemical characterization in Rice
Morphological and biochemical characterization in Rice
AbhishekChauhan911496
 
Abzymes mimickers in catalytic reactions at nanoscales
Abzymes mimickers in catalytic reactions at nanoscalesAbzymes mimickers in catalytic reactions at nanoscales
Abzymes mimickers in catalytic reactions at nanoscales
OrchideaMariaLecian
 
Driving sustainability: AI adoption framework for the fast fashion industry
Driving sustainability: AI adoption framework for the fast fashion industryDriving sustainability: AI adoption framework for the fast fashion industry
Driving sustainability: AI adoption framework for the fast fashion industry
Selcen Ozturkcan
 
CloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy Texts
CloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy TextsCloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy Texts
CloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy Texts
sehilyi
 
chemistry-class-ix-reference-study-material (1).pdf
chemistry-class-ix-reference-study-material (1).pdfchemistry-class-ix-reference-study-material (1).pdf
chemistry-class-ix-reference-study-material (1).pdf
s99808177
 
Molecular biology and pellet weight marked
Molecular biology and pellet weight markedMolecular biology and pellet weight marked
Molecular biology and pellet weight marked
nandanitiwari82528
 
Comparative anatomy of brain of different types of vertebrates
Comparative anatomy of brain of different types of vertebratesComparative anatomy of brain of different types of vertebrates
Comparative anatomy of brain of different types of vertebrates
arpanmaji480
 
Multi-View Design Patterns & 
Responsive Visualization for
Genomics Data
Multi-View Design Patterns & 
Responsive Visualization for
Genomics DataMulti-View Design Patterns & 
Responsive Visualization for
Genomics Data
Multi-View Design Patterns & 
Responsive Visualization for
Genomics Data
sehilyi
 
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdf
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdfHOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdf
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdf
Faga1939
 
instrument of surgery help for the practical
instrument of surgery help for the practicalinstrument of surgery help for the practical
instrument of surgery help for the practical
radialcarpoulnaris
 
Entomopath angrau third year path 365pdf
Entomopath angrau third year path 365pdfEntomopath angrau third year path 365pdf
Entomopath angrau third year path 365pdf
zap6635
 
BOT-245_Breeding_of_Field_and_Horticultural_Crops.pdf
BOT-245_Breeding_of_Field_and_Horticultural_Crops.pdfBOT-245_Breeding_of_Field_and_Horticultural_Crops.pdf
BOT-245_Breeding_of_Field_and_Horticultural_Crops.pdf
zap6635
 
Pillbug Science Experiment Slides Presentation
Pillbug Science Experiment Slides PresentationPillbug Science Experiment Slides Presentation
Pillbug Science Experiment Slides Presentation
sawyerkwoodruff
 
Class 12 biology project on the topic cancer
Class 12 biology project on the topic cancerClass 12 biology project on the topic cancer
Class 12 biology project on the topic cancer
crazycompetitor000
 
Understanding Visualization Authoring for Genomics Data through User Interviews
Understanding Visualization Authoring for Genomics Data through User InterviewsUnderstanding Visualization Authoring for Genomics Data through User Interviews
Understanding Visualization Authoring for Genomics Data through User Interviews
sehilyi
 
AI for Program Specifications Berkeley May 2025.pdf
AI for Program Specifications Berkeley May 2025.pdfAI for Program Specifications Berkeley May 2025.pdf
AI for Program Specifications Berkeley May 2025.pdf
shuvendulahiri1
 
Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)
Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)
Treatment of TMDS.by Dr.Devraj Neupane(MDS Resedent)
Dr.Devraj Neupane
 
Grammar-Based 
Interactive Visualization of Genomics Data
Grammar-Based 
Interactive Visualization of Genomics DataGrammar-Based 
Interactive Visualization of Genomics Data
Grammar-Based 
Interactive Visualization of Genomics Data
sehilyi
 
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...
DrJamesFarley
 
Morphological and biochemical characterization in Rice
Morphological and biochemical characterization in RiceMorphological and biochemical characterization in Rice
Morphological and biochemical characterization in Rice
AbhishekChauhan911496
 
Abzymes mimickers in catalytic reactions at nanoscales
Abzymes mimickers in catalytic reactions at nanoscalesAbzymes mimickers in catalytic reactions at nanoscales
Abzymes mimickers in catalytic reactions at nanoscales
OrchideaMariaLecian
 
Driving sustainability: AI adoption framework for the fast fashion industry
Driving sustainability: AI adoption framework for the fast fashion industryDriving sustainability: AI adoption framework for the fast fashion industry
Driving sustainability: AI adoption framework for the fast fashion industry
Selcen Ozturkcan
 
CloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy Texts
CloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy TextsCloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy Texts
CloakingNote: A Novel Desktop Interface for Subtle Writing Using Decoy Texts
sehilyi
 
chemistry-class-ix-reference-study-material (1).pdf
chemistry-class-ix-reference-study-material (1).pdfchemistry-class-ix-reference-study-material (1).pdf
chemistry-class-ix-reference-study-material (1).pdf
s99808177
 
Molecular biology and pellet weight marked
Molecular biology and pellet weight markedMolecular biology and pellet weight marked
Molecular biology and pellet weight marked
nandanitiwari82528
 
Comparative anatomy of brain of different types of vertebrates
Comparative anatomy of brain of different types of vertebratesComparative anatomy of brain of different types of vertebrates
Comparative anatomy of brain of different types of vertebrates
arpanmaji480
 
Multi-View Design Patterns & 
Responsive Visualization for
Genomics Data
Multi-View Design Patterns & 
Responsive Visualization for
Genomics DataMulti-View Design Patterns & 
Responsive Visualization for
Genomics Data
Multi-View Design Patterns & 
Responsive Visualization for
Genomics Data
sehilyi
 
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdf
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdfHOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdf
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdf
Faga1939
 
instrument of surgery help for the practical
instrument of surgery help for the practicalinstrument of surgery help for the practical
instrument of surgery help for the practical
radialcarpoulnaris
 
Entomopath angrau third year path 365pdf
Entomopath angrau third year path 365pdfEntomopath angrau third year path 365pdf
Entomopath angrau third year path 365pdf
zap6635
 
BOT-245_Breeding_of_Field_and_Horticultural_Crops.pdf
BOT-245_Breeding_of_Field_and_Horticultural_Crops.pdfBOT-245_Breeding_of_Field_and_Horticultural_Crops.pdf
BOT-245_Breeding_of_Field_and_Horticultural_Crops.pdf
zap6635
 
Pillbug Science Experiment Slides Presentation
Pillbug Science Experiment Slides PresentationPillbug Science Experiment Slides Presentation
Pillbug Science Experiment Slides Presentation
sawyerkwoodruff
 

Impact of adversarial examples on deep learning models for biomedical image segmentation

  • 1. IMPACT OF ADVERSARIAL EXAMPLES ON DEEP LEARNING MODELS FOR BIOMEDICAL IMAGE SEGMENTATION Utku Ozbulak1,3 , Arnout Van Messem2,3 , Wesley De Neve1,3 1 Department of Electronics and Information Systems, Ghent University, Belgium 2 Department of Applied Mathematics, Computer Science and Statistics, Ghent University, Belgium 3 Center for Biotech Data Science,Ghent University Global Campus, South Korea Abstract Deep learning models, which are increasingly being used in the field of medical image analysis, come with a major security risk, namely, their vulnerability to adversarial examples. Given that a large portion of medical imaging prob- lems are effectively segmentation problems, we analyze the impact of adversarial examples on deep learning models for biomedical im- age segmentation. We expose the vulnerability of these models to adversarial examples by propos- ing a novel algorithm, namely, the Adaptive Segmentation Mask Attack (ASMA). This algorithm makes it possible to craft targeted adversarial examples that come with high Intersection-over-Union rates between the target adversar- ial mask and the prediction, as well as with perturbation that is mostly invisible to the bare eye. Motivation Given that (1) labor expenses (i.e., salaries of nurses, doctors, and other relevant personnel) are a key driver of high costs in the medical field and (2) that increasingly super-human results are obtained by machine learning systems, an ongoing discussion is to replace or augment manual labor with automation for a number of medical diagnosis tasks [1]. However, a recent development called adver- sarial examples showed that deep learning models are vulnerable to gradient-based attacks [2]. This vulnerability, which is considered a major security flaw, for instance enables the creation of fraud schemes (e.g., for insurance claims) when deep learning models are carrying out clinical tasks [1]. The above observations motivate our effort to better understand the impact of adversarial examples on deep learning approaches towards biomedical image segmentation, so to facilitate the secure deployment of deep learning models during clinical tasks. References [1] Finlayson S.G., Chung H.W., Kohane I.S., Beam A.L., Adversarial Attacks Against Medical Deep Learning Systems [2] Szegedy C., Zaremba W., Sutskever I., Bruna J., Erhan D., Goodfellow I., Fergus R., Intriguing Properties of Neural Networks [3] Pena-Betancor C., Gonzalez-Hernandez M., Fumero-Batista F., Sigut J., Medina-Mesa E., Alayon S., de la Rosa M., Estimation of the Relative Amount of Hemoglobin in the Cup and Neuroretinal Rim using Stereoscopic Color Fundus Images [4] Gutman D., Codella N., Celebi M., Helba B., Marchetti M., Mishra N., Halpern A., Skin Lesion Analysis toward Melanoma Detection [5] Ronneberger O., Fischer P., Brox T., U-Net: Convolutional Networks for Biomedical Image Segmentation Biotech Data Science Center for Adaptive Segmentation Mask Attack Adversarial examples are malicious data points that force machine learning models to make mistakes during testing time [2]. + 0.01× = Genuine Image Prediction: Cancer Confidence: 0.95 Perturbation (Enhanced × 100 ) Adversarial Example Prediction: Healthy Confidence: 0.99 By introducing a novel algorithm for producing targeted adversarial examples for image segmentation problems, we expose the vulnerability of deep learning models for biomedical image segmentation to malicious data points. Our algorithm, named Adaptive Segmentation Mask Attack (ASMA), incorporates two techniques, namely, the use of (1) adaptive segmentation masks and (2) dynamic perturbation multipliers. The proposed attack is defined as follows: X : Input image. g(θ, X) : Forward pass from a neural network g with parameters θ using input X. YA : Target (adversarial) mask. Pn : Added perturbation at nth iteration. minimize || X − (X + P) ||2 , such that arg max g(θ, (X + P)) = YA , (X + P) ∈ [0, 1]z , Pn = M−1 c=0 x g(θ, Xn)c 1{YA = c} 1{arg maxM (g(θ,Xn)) = c} . ASMA is able to craft adversarial examples with 97% and 89% Intersection-over-Union (IoU) accuracy for the Glaucoma Dataset [3] and the ISIC Skin Lesion Dataset [4], respectively, with IoU measured between the pre- dicted segmentation for a given adversarial example and the corresponding target mask. While doing so, our algorithm modifies the image so subtly that the perturbations, for the most part, are not visible to the bare eye. + = Segmentation Mask of (a) (a) Source Image Generated Perturbation (Enhanced × 100) Generated Adversarial Example L2 = 2.3, L∞ = 0.16 Segmentation Mask of (b) (Target Mask) (b) Target Image Adaptive Optimization Masks Predicted Segmentation for the Adversarial Example IoU = 98%, PA = 99% Using ASMA, results obtained for the two above-mentioned biomedical datasets (mean and standard deviation) are provided in the table below (PA denotes Pixel Accuracy). Glaucoma Dataset ISIC Skin Lesion Dataset Modification Accuracy Modification Accuracy Optimization L2 L∞ IoU PA L2 L∞ IoU PA ASMA 2.47 0.17 97% 99% 3.88 0.16 89% 98% ±1.05 ±0.09 ±2% ±1% ±1.99 ±0.09 ±10% ±1% * The experiments presented above are conducted in white-box settings, using the U-Net architecture [5].