Alert button

Batch Normalization is a Cause of Adversarial Vulnerability

May 06, 2019
Angus Galloway, Anna Golubeva, Thomas Tanay, Medhat Moussa, Graham W. Taylor

Figure 1 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 2 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 3 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 4 for Batch Normalization is a Cause of Adversarial Vulnerability

Share this with someone who'll enjoy it:

Batch normalization (batch norm) is often used in an attempt to stabilize and accelerate training in deep neural networks. In many cases it indeed decreases the number of parameter updates required to reduce the training error. However, it also reduces robustness to small input perturbations and noise by double-digit percentages, as we show on five standard datasets. Furthermore, substituting weight decay for batch norm is sufficient to nullify the relationship between adversarial vulnerability and the input dimension. Our work is consistent with a mean-field analysis that found that batch norm causes exploding gradients.

View paper onarxiv iconopen_review iconOpenReview

Share this with someone who'll enjoy it: