Next Article in Journal
Advances in Mesenchymal Stem Cell Therapy for Osteoarthritis: From Preclinical and Clinical Perspectives
Previous Article in Journal
Selenium Bio-Nanocomposite Based on Alteromonas macleodii Mo169 Exopolysaccharide: Synthesis, Characterization, and In Vitro Antioxidant Activity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Threat of Adversarial Attack on a COVID-19 CT Image-Based Deep Learning System

Graduate School of Advanced Science and Engineering, Hiroshima University, Higashi-Hiroshima 739-8511, Japan
*
Author to whom correspondence should be addressed.
Bioengineering 2023, 10(2), 194; https://doi.org/10.3390/bioengineering10020194
Submission received: 6 January 2023 / Revised: 15 January 2023 / Accepted: 31 January 2023 / Published: 2 February 2023

Abstract

:
The coronavirus disease 2019 (COVID-19) rapidly spread around the world, and resulted in a global pandemic. Applying artificial intelligence to COVID-19 research can produce very exciting results. However, most research has focused on applying AI techniques in the study of COVID-19, but has ignored the security and reliability of AI systems. In this paper, we explore adversarial attacks on a deep learning system based on COVID-19 CT images with the aim of helping to address this problem. Firstly, we built a deep learning system that could identify COVID-19 CT images and non-COVID-19 CT images with an average accuracy of 76.27%. Secondly, we attacked the pretrained model with an adversarial attack algorithm, i.e., FGSM, to cause the COVID-19 deep learning system to misclassify the CT images, and the classification accuracy of non-COVID-19 CT images dropped from 80% to 0%. Finally, in response to this attack, we proposed how a more secure and reliable deep learning model based on COVID-19 medical images could be built. This research is based on a COVID-19 CT image recognition system, which studies the security of a COVID-19 CT image-based deep learning system. We hope to draw more researchers’ attention to the security and reliability of medical deep learning systems.

Graphical Abstract

1. Introduction

Towards the end of 2019, the coronavirus disease 2019 (COVID-19), caused by the SARS-CoV-2 virus, emerged; infections were mainly transmitted through respiratory droplets, spread rapidly, and eventually, were recognized as a global pandemic by the WHO [1,2]. The most common clinical symptoms of COVID-19 infection include a cough, fever, headache and so on [3,4]. Particularly, in high-risk populations such as the elderly or those with numerous disorders where COVID-19 may induce lung damage, infection with COVID-19 is more likely to result in viral pneumonia. Severely infected patients may develop acute respiratory distress syndrome, severe lung infection and fibrosis, and even death [5]. The rapid global spread of COVID-19 has caused serious damage to human health, the world economy, and public health security [6,7,8].
At the beginning of the COVID-19 epidemic, its clinical diagnosis was based on a patient’s epidemiology, clinical presentation, a chest X-ray, chest CT, and RT-PCR [9,10]. As compared with other diagnostic methods, chest CT, which is the main tool for screening and diagnosing COVID-19, can detect pulmonary lesions and can also classify patients into early, intermediate, or severe cases based on CT manifestations in the chest [11,12,13]. CT images of the lungs of patients with COVID-19 show patchy or ground glass shadows [14]. As the disease progresses, the severity of the lung lesions may become more significant, and pulmonary fibrosis may develop, with a white coloration of both lungs detected by CT lung examination [15,16]. Therefore, it is crucial to display information about the lungs of COVID-19 cases through CT. Doctors can correctly evaluate patients’ CT images, thus, diagnosing patients’ conditions for early detection and treatment.
COVID-19 has attracted considerable attention from researchers, and studies on the disease have covered various fields such as informatics, biochemistry, medicine, and vaccines [17,18,19,20]. One of the most exciting topics has concerned the application of machine learning in the study of COVID-19 [21,22]. Narayana Darapaneni proposed a machine learning approach to predict COVID-19 cases in a clinical test sample population with an accuracy of 87.0–97.4 percent [23]. Aras M. Ismael built a new deep learning model in order to detect chest X-ray images of COVID-19 [24]. Nathalie Lassau combined a CT image deep learning model with biological and clinical information to more accurately predict the extent of COVID-19 patients’ diseases [25]. Pahar M developed a machine learning model to discriminate between COVID-19 positive coughs and COVID-19 negative coughs captured on smartphones. The Resnet50 classifier performed the best out of seven machine learning classifiers that were separately examined and tested, and it could be a viable and practical technique for non-contact COVID-19 screening [26]. Wang, X. developed a weakly supervised deep learning model for the identification and lesion localization of COVID-19 cases using 3D CT volumes. The accuracy of the model was 0.901 for the classification of positive and negative COVID-19. It offered a quick and reliable approach for the quick identification of COVID-19 patients [27]. Shervin Minaee trained four well-known convolutional neural networks using transfer learning to analyze chest X-ray images and to detect COVID-19 infection. The majority of these networks attained remarkable performance [28]. Mohit Agarwal used nine artificial intelligent models, including machine learning, deep learning, and transfer learning, to classify and to characterize COVID-19 lung CT. As compared with other methods, deep learning showed superior performance in analyzing the severity of COVID-19 lung infections [29]. Wang, L. considered available chest X-rays of COVID-19 patients and suggested a COVID-Net model based on a deep convolutional neural network that could identify COVID-19 cases from chest X-rays. The model could aid doctors in improving screening to identify COVID-19 cases [30].
There is no doubt that deep learning has achieved remarkable success in many fields such as autonomous driving [31], e-commerce [32], medical image analysis [33], and protein structure prediction [34]. A medical image analysis is the study of interactions with the human body using a specific media. Then, the internal organs and tissues of the human body are represented as images, and diagnostic doctors make decisions based on the data supplied by medical images to evaluate the body’s health. Current common medical imaging includes X-ray imaging, computed tomography, nuclear magnetic resonance imaging, cardiac angiography, mammography, and so on. Medical image diagnosis has undergone a revolution thanks to deep learning. However, the security of deep learning systems has also received considerable attention from researchers [35]. Szegedy et al. [36] first identified the weaknesses of deep neural networks in image classification tasks, whereby, input samples that were intentionally added with some subtle human-imperceptible perturbations to the input samples were shown to give the model an incorrect output with high confidence. More unexpectedly, the same image perturbation was shown to fool many network classifiers, and this interesting phenomenon has encouraged many researchers to pay more attention to issues such as the security of deep learning [37,38]. However, most of the current research on the security of deep learning has focused on natural images and natural language, and there has been little research on medical images. As compared with other deep learning systems, the security of medical image-based deep learning systems is crucial, because medical images are related to personal health data, and the correct recognition and analysis of medical images through deep learning systems is an important tool to assist doctors in diagnosis, and any wrong diagnosis about a condition may bring irreparable harm. Additionally, dishonest individuals could attack the medical deep learning system in an effort to tamper with the outcomes of medical image diagnosis, which would subsequently lead to insurance fraud. Therefore, in this paper, we study the security of a COVID-19 CT image-based deep learning system.
The main contributions of this paper are as follows:
  • We built a deep learning system based on COVID-19 CT images and non-COVID-19 CT images, and the model achieved good performance for the classification of two different CT images with an average accuracy of 76.27%.
  • We used an adversarial attack algorithm, FGSM, to demonstrate the existence of security vulnerabilities in the COVID-19 CT image-based deep learning system. The pretrained model’s classification accuracy of non-COVID-19 CT images decreased from 80% to 0% when FGSM was used to attack it.
  • To address the security vulnerabilities of medical image-based deep learning systems, we discussed how to build a COVID-19 CT-based deep learning system with good defense performance.

2. Related Work

In this section, we introduce the concept of the adversarial sample, the classification of attack methods, and methods of generating adversarial samples.

2.1. Adversarial Sample

An adversarial sample is generated by applying subtle perturbations (that are difficult to detect by the naked eye but are acceptable to the deep learning model) to the original data, leading to the input data being misjudged by the deep learning model. The input data are denoted by x, the deep learning model is denoted by g, the classification result is denoted by g(x), and the perturbation is denoted by ϵ. Suppose there is a slight perturbation ϵ:
|ϵ| < δ and g(x + ϵ)! = g(x)
Then, x + ϵ can be called an adversarial sample.

2.2. Classification of Methods

There are various classifications of attacks based on their attack environments; therefore, attacks can be classified as black-box, white-box, and gray-box attacks [39].
Black-box attacks mean that the attacker does not know the internal structure of the attacking model, the training parameters, or the defense methods, and can only interact with the model through the output.
White-box attacks are unlike black-box models, as the attacker knows everything about the model, including the network structure and parameters. Most of the current attack algorithms are white-box attacks.
Gray-box attacks are found between black-box and white-box attacks, and only a part of the model is known (e.g., realizing the output probability of the model or understanding the model structure but not the parameters).
In relation to the purpose of the attack, attacks can be divided into targeted and untargeted attacks [40].
An untargeted attack is associated with image classification, namely in the sense that the attacker only needs to make the target model misclassify the sample but does not specify which classification is wrong.
A targeted attack means that the attacker specifies a class so that the target model not only misclassifies the samples but also misclassifies them into the specified type. In terms of difficulty, targeted attacks are more challenging to implement than untargeted attacks.

2.3. Current Methods of Generating Adversarial Samples

There are several adversarial attack methods proposed in the literature, but we only discuss the ones that are most relevant in this section.

2.3.1. Optimization-Based Generation of Adversarial Samples

In the training phase of the model, the value of the loss function is continuously reduced by calculating the loss function between the predicted and true values of the sample data, adjusting various parameters of the model in the backward transfer process, and iteratively calculating the parameters of each layer of the model to generate adversarial samples. Carlinr et al. [41] proposed a set of adversarial C&W attacks based on optimization, considering both a high attack rejection rate and low adversarial disturbance.
r n = ( t a n h ( w n ) + 1 ) / 2 x n min w x r n = c   f   ( ( t a n h ( w n ) + 1 ) / 2 ) w h e r e   f ( x ) = m a x ( m a x { Z ( x ) i x : i t } Z ( x ) t , k )

2.3.2. Gradient-Based Generation of Adversarial Samples

The gradient is obtained from the input data in the training phase, then the input data are updated stepwise according to the loss function, and finally, the adversarial sample is obtained. Commonly used adversarial attack algorithms include the fast gradient sign method (FGSM) [42], the basic iterative method (BIM) [43], and the project gradient descent (PDG) method [44]. The specific form of the adversarial samples generated with the FGSM is as follows:
x∗ = x + ϵ · sign(∇x J(θ,x,y))
where x is the input data, y is the label of x, θ is the parameter of the model, J() is the loss function, and ϵ is an artificially set perturbation parameter. The FGSM algorithm is shown below (Algorithm 1).
Algorithm 1 FGSM.
Input: original image, orig_im; original_target, orig_tar;
Output: adversarial image, adv_im; adversarial target, adv_tar;
adv_im = orig_im
iteration = 1
while iteration < max_iteration and adv_tar = orig_tar
adv_im = orig_im + iteration * step_size * sign(gradient(orig_im))
adv_im = clip(adv_im, min, max)
  iteration + = 1
end
return adv_im

2.3.3. Adversarial Network-Based Generation of Adversarial Samples

In 2014, Goodfellow proposed exciting adversarial attack networks (GANs) [45], and then various studies on GANs have also emerged. GANs consist of two parts: a generator and a discriminator. A generator (G) is used to generate realistic samples from random noise, and a discriminator (D) is trained to discriminate the real data from the generated data, and both are trained at the same time until a balance is reached, in which the data generated by the generator is indistinguishable from the real data, and the discriminator cannot distinguish the generated data from the real data correctly. Similarly, GAN-based networks can generate adversarial samples more efficiently. AdvGAN is a method for generating adversarial samples based on GANs models; given the input x, the perturbation G(x) is generated by the generator network [46]. On the one hand, G(x) + x is sent to the discriminator network for training, and on the other hand, G(x) + x is sent to the attacked network. The objective loss function is continuously optimized, and G(x) is the perturbation when the model reaches optimality. The target loss can be decomposed into three parts, expressed as:
L = L a d v f + α L a d v + β L h i n g e
where L a d v f is the misleading misclassification loss, Ladv is the loss function of the GAN, and Lhinge is used to restrict the perturbations to a certain range.
We summarized the main adversarial attack algorithms in Table 1.

3. Experiment

The experiments in this paper consist of two parts, building a deep learning system and attacking the deep learning system. To demonstrate the security vulnerability and attack ability of a deep learning system based on COVID-19 CT images, first, we built a deep learning system that could accurately identify CT images infected with COVID-19 and CT images without COVID-19 infection, and then we attacked this deep learning system with the adversarial attack algorithm FGSM.

3.1. Building the Deep Learning System

Building the deep learning system involved training and testing a deep neural network (Figure 1). The training and testing stages meant that datasets had to be selected. The deep neural network needed to be carefully selected. In this section, we address these issues.

3.1.1. Datasets

The CT image data in this paper were obtained from publicly available datasets extracted from the medRxiv and bioRxiv preprints of COVID-19 by Xingyi Yang at the University of California, San Diego [52]. These datasets are anonymous and can be applied to the study of COVID-19. The datasets contained 349 CT images of COVID-19 infection cases (COVID-19 CT images) and 397 CT images of cases without COVID-19 infection (non-COVID-19 CT images). The whole dataset was divided into three parts (the training set, the validation set, and the testing set), with a ratio of 0.8:0.1:0.1 (Table 2).

3.1.2. Deep Learning Model

As compared with machine learning, the advantage of deep learning is that the network capacity is large enough to accommodate richer feature information, and the deep learning effect always improves as the number of data increases and deepens. Deep learning is a complex machine learning algorithm, and with continuous research, many classical deep learning models have emerged, which have greatly improved the performance of deep learning. We chose the classical Resnet model, the winning model of ImageNet 2015, which offers several advantages such as a very low error rate; it also presents little complexity and only requires small computational effort [53]. One of the factors for better performance of deep learning is the dataset; a large dataset can make the model achieve better training results. Transfer learning is a powerful method for transferring knowledge learned in one scenario to another scenario application. Since there are fewer CT images in the public dataset, it is difficult to achieve better performance of a deep learning model based on such a small dataset if trained from scratch; therefore, transfer learning can help to train a deep learning model with better performance more efficiently. Therefore, we used the transfer learning method to build a deep learning system based on COVID-19 images using the pretrained Resnet-50 model. The parameters of the model were frozen, the pooling layer and fully connected layer were replaced, and the dropout layer rate was set to 0.5. The optimizer used adaptive moment estimation (Adam) [54], performed fine tuning using stochastic gradient descent with a learning rate of 1 × 10-3, and fully changed the connected layer to two classifications (COVID-19 CT images and non-COVID-19 CT images). Preprocessing and data augmentation operations were performed on all CT image datasets.

3.1.3. Metrics

The performance metrics used in this paper to evaluate the COVID-19 image-based deep learning model were accuracy and area under the curve (AUC) [55]. True positives (TP) indicated the number of COVID-19 images that were correctly classified as COVID-19 CT images. False positives (FP) indicated the number of non-COVID-19 images that were incorrectly classified as COVID-19 images. True negatives (TN) denoted the number of non-COVID-19 images that were correctly classified as non-COVID-19 CT images. False negatives (FN) indicated the number of COVID-19 images that were incorrectly classified as non-COVID-19 CT images.
Accuracy = (TP + TN)/(TP + TN + FP + FN)

3.2. Adversarial Attack of the COVID-19 CT Image-Based Deep Learning System

To verify the security and reliability of the deep learning model based on COVID-19 CT images, we attacked the pretrained model by adding subtle interferences to the non-COVID-19 CT images of the testing set, which were hard for the naked eye to detect and could be misclassified by the model (Figure 2).
In addition, in order to verify the relationship between the epsilon of the adversarial attack algorithm and the classification accuracy of the deep learning model, we took non-COVID-19 CT images as the study object and tested the effect of different epsilons on the classification accuracy of the model. Based on the pretrained deep learning model that could correctly classify COVID-19 CT images and non-COVID-19 CT images, we used the pretrained models with the FGSM algorithm based on a gradient to generate adversarial images.

4. Results

After training, we tested and obtained an accuracy of 76.27% and an AUC value of 85.80% for the COVID-19 CT image-based deep learning model (Table 3). This indicates that the model can accurately identify COVID-19 CT images and non-COVID-19 CT images and possesses good recognition accuracy.
Based on the above-trained model, we took a non-COVID-19 infection as an example and superimposed a slight perturbation on the original image with the FGSM algorithm. The deep learning model does not correctly classify non-COVID-19 images, and it is also difficult to discriminate with the human eye when we compare the adversarial image with the non-COVID-19 image. (Figure 3).
To investigate the perturbation of epsilons on the accuracy of the testing set, we set different epsilon values, and then evaluated the relationship between the epsilons and the accuracy of the non-COVID-19 CT images (Table 4). As shown in Table 4, when epsilon is 0, the deep learning system is not attacked by the adversarial attack algorithm FGSM and the accuracy of the model is 80%, which indicates that the model has good recognition performance for non-COVID-19 CT images. We found that the accuracy of the test set decreased with increasing epsilons, suggesting that superimposing a larger epsilon on the original data could allow the deep learning model to classify images with a higher error rate (Figure 4).
To illustrate that the adversarial attack could degrade the detection performance of the COVID-19 CT image-based deep learning system, we took the FGSM attack as an example and conducted experiments by setting different perturbation rates in the original image to verify the perturbation change and display the corresponding CT images. As shown in Figure 5, when the perturbation was set to 0.1, 0.2, and 0.3, all the adversarial images could be successfully generated. However, when the perturbation ϵ was 0.1, an adversarial image that was unrecognizable to the human eye could be successfully generated, while the generated adversarial image could be recognized by the human eye when the epsilon was set to 0.3. Therefore, in the study of adversarial attacks, the balance between the classification accuracy of the adversarial attack on the deep learning system and the recognition accuracy of the adversarial image by the human eye is a very important issue. We want the adversarial image to fool the deep learning model with a high fooling rate, but not be easily detected by the human eye.

5. Discussion

We analyzed and studied the impact of adversarial images on deep learning recognition based on COVID-19 CT images. While most previous studies on deep learning for COVID-19 have focused on how to build a deep learning system that was capable of accurately recognizing COVID-19 CT images, we focused on the security and reliability of the deep learning system based on COVID-19 CT images. By implementing the transfer learning method, we developed a deep learning system based on COVID-19 CT images and non-COVID-19 CT images, and the model had an average accuracy of 76.27% for classifying the two different CT images. Subsequently, we used the adversarial attack algorithm FGSM to show that the COVID-19 CT image-based deep learning system had security vulnerabilities. When FGSM was employed for the attack, the pretrained model’s identification accuracy for non-COVID-19 CT images fell from 80% to 0%. In the field of AI security, there has been a lot of research on the security of deep learning systems based on natural images. Unlike natural-image-based deep learning systems, the security and reliability of medical deep learning systems are critical to every patient; therefore, findings ways of building a safe, reliable, and trustworthy medical imaging system is a very important issue.
To solve this problem, we used adversarial images to strengthen the model, as shown in Figure 6. First of all, we generated a large number of adversarial images by attacking the target model using the adversarial attack algorithm, and then we put the adversarial images into the model for retraining together with the original data, so that the deep learning model could learn the features of the adversarial images during the training process, and thus could continuously update various parameters in the model to achieve better performance. In this way, we obtained a defense model based on COVID-19 CT images.
In addition, another approach may involve adding a denoiser to the COVID-19 CT image-based deep learning system (Figure 7). An image is made up of useful information and noise that degrades clarity. The function of a denoiser is to remove the noise from the image and to retain only the useful information for a clear image. Deep learning is the process of extracting various features of the input data, and then continuously updating the parameters to achieve the desired performance. Before the training process, a denoiser can be added to preprocess all the images, which can then reduce the noise of the adversarial images, thus, minimizing the interference of the adversarial images to the training model and improving the accuracy of the deep learning model.

6. Conclusions

There is no doubt that the application of deep learning in medical diagnosis is promising, and AI technology has contributed greatly to the rapid development of medicine and health care. However, issues such as safety and reliability in deep learning systems cannot be ignored, especially in the medical field where people’s health is crucial. In this paper, we used COVID-19 CT images and non-COVID-19 CT images to address the vulnerabilities and security issues of a deep learning system, and then discussed how a more secure and reliable deep learning system could be built to address the security vulnerabilities. Most importantly, in the real world, one of the security risks of a COVID-19 CT image-based deep learning system is medical fraud created by modifying non-COVID-19 CT images into COVID-19 CT images to obtain high health insurance premiums. We hope to draw developers’ attention to the security and reliability of deep learning systems so that they can develop more secure and reliable medical-based deep learning systems.
However, in this paper, we do not engage in extensive experimental research; we merely discuss two strategies for defense against adversarial attacks. It is more crucial, in our opinion, to learn how to better defend against adversarial attacks and to create a more secure and reliable COVID-19 CT image-based deep learning system. As a result, more thorough studies should be conducted on the defense deep learning system in future work. In other words, attack and defense are similar to a wrestling match against each other, They grow and improve in the constant confrontation, which leads to better robustness of the deep learning model. For medical images, slight interference can cause incredible differences in judgment results, and medical images are closely related to people’s health. Therefore, the security and reliability of deep learning systems based on medical images are particularly important. In addition, various adversarial attacks are developed based on natural images, and although the attack algorithms can also be applied to medical images, there are no adversarial attack algorithms specific to medical images. There is a significant difference between natural images and medical images. Medical images have more special textures and features as compared to natural images, and the different features reflect the degree of illness; thus, developing adversarial attack algorithms based on medical images is also very important.

Author Contributions

Conceptualization, Y.L.; methodology, Y.L.; software, Y.L.; validation, Y.L.; formal analysis, Y.L.; investigation, Y.L.; resources, Y.L.; data curation, Y.L.; writing—original draft preparation, Y.L.; writing—review and editing, Y.L. and S.L.; visualization, Y.L.; supervision, Y.L. and S.L.; project administration, Y.L. and S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by JST SPRING (grant number JPMJSP2132).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available upon request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Shi, Y.; Wang, G.; Cai, X.; Deng, J.-W.; Zheng, L.; Zhu, H.-H.; Zheng, M.; Yang, B.; Chen, Z. An overview of COVID-19. J. Zhejiang Univ. Sci. B 2020, 21, 343–360. [Google Scholar] [PubMed]
  2. Hu, K.; Su, Y.; Wang, J.; Xu, Y. A review of COVID-19: A summary of the epidemic in Wuhan and other local areas in Chin. In Proceedings of the E3S Web of Conferences, Nanjing, China, 25-27 June 2021; EDP Sciences: Les Ulis, France, 2021; p. 292. [Google Scholar]
  3. Wan, S.; Xiang, Y.; Fang, W.; Zheng, Y.; Li, B.; Hu, Y.; Lang, C.; Huang, D.; Sun, Q.; Xiong, Y.; et al. Clinical features and treatment of COVID-19 patients in northeast Chongqing. J. Med. Virol. 2020, 92, 797–806. [Google Scholar] [CrossRef] [PubMed]
  4. Ciotti, M.; Ciccozzi, M.; Terrinoni, A.; Jiang, W.-C.; Wang, C.-B.; Bernardini, S. The COVID-19 pandemic. Crit. Rev. Clin. Lab. Sci. 2020, 57, 365–388. [Google Scholar] [CrossRef]
  5. Mizrahi, B.; Shilo, S.; Rossman, H.; Kalkstein, N.; Marcus, K.; Barer, Y.; Keshet, A.; Shamir-Stein, N.; Shalev, V.; Zohar, A.E.; et al. Longitudinal symptom dynamics of COVID-19 infection. Nat. Commun. 2020, 11, 6208. [Google Scholar]
  6. Wölfel, R.; Corman, V.M.; Guggemos, W.; Seilmaier, M.; Zange, S.; Müller, M.A.; Niemeyer, D.; Jones, T.C.; Vollmar, P.; Rothe, C.; et al. Virological assessment of hospitalized patients with COVID-2019. Nature 2020, 581, 465–469. [Google Scholar]
  7. Fernandes, N. Economic Effects of Coronavirus Outbreak (COVID-19) on the World Economy; IESE Business School Working Paper No.WP-1240-E; IESE Business School: Barcelona, Spain, 2020. [Google Scholar]
  8. Budd, J.; Miller, B.S.; Manning, E.M.; Lampos, V.; Zhuang, M.; Edelstein, M.; Rees, G.; Emery, V.C.; Stevens, M.M.; Keegan, V.; et al. Digital technologies in the public-health response to COVID-19. Nat. Med. 2020, 26, 1183–1192. [Google Scholar]
  9. Coronaviridae Study Group of the International Committee on Taxonomy of Viruses. The species severe acute respiratory syndrome-related coronavirus: Classifying 2019-nCoV and naming it SARS-CoV-2. Nat. Microbiol. 2020, 5, 536–544. [Google Scholar] [CrossRef]
  10. Ai, T.; Yang, Z.; Hou, H.; Zhan, C.; Chen, C.; Lv, W.; Tao, Q.; Sun, Z.; Xia, L. Correlation of chest CT and RT-PCR testing in coronavirus disease 2019 (COVID-19) in China: A report of 1014 cases. Radiology 2020, 296, E32–E40. [Google Scholar] [CrossRef]
  11. Lee, E.Y.P.; Ng, M.Y.; Khong, P.L. COVID-19 pneumonia: What has CT taught us? Lancet Infect. Dis. 2020, 20, 384–385. [Google Scholar] [CrossRef]
  12. Wan, S.; Li, M.; Ye, Z.; Yang, C.; Cai, Q.; Duan, S.; Song, B. CT manifestations and clinical characteristics of 1115 patients with coronavirus disease 2019 (COVID-19): A systematic review and meta-analysis. Acad. Radiol. 2020, 27, 910–921. [Google Scholar]
  13. Bao, C.; Liu, X.; Zhang, H.; Li, Y.; Liu, J. Coronavirus disease 2019 (COVID-19) CT findings: A systematic review and meta-analysis. J. Am. Coll. Radiol. 2020, 17, 701–709. [Google Scholar] [CrossRef]
  14. Hani, C.; Trieu, N.; Saab, I.; Dangeard, S.; Bennani, S.; Chassagnon, G.; Revel, M.-P. COVID-19 pneumonia: A review of typical CT findings and differential diagnosis. Diagn. Interv. Imaging 2020, 101, 263–268. [Google Scholar] [CrossRef]
  15. Guan, C.S.; Lv, Z.B.; Yan, S.; Du, Y.N.; Chen, H.; Wei, L.G.; Xie, R.M.; Chen, B.D. Imaging features of coronavirus disease 2019 (COVID-19): Evaluation on thin-section CT. Acad. Radiol. 2020, 27, 609–613. [Google Scholar]
  16. Zhu, J.; Zhong, Z.; Li, H.; Ji, P.; Pang, J.; Li, B.; Zhang, J. CT imaging features of 4121 patients with COVID-19: A meta-analysis. J. Med. Virol. 2020, 92, 891–902. [Google Scholar] [CrossRef]
  17. Alsharif, M.H.; Alsharif, Y.H.; Albreem, M.A.; Jahid, A.; Solyman, A.A.A.; Yahya, K.; Alomari, O.A.; Hossain, M.S. Application of machine intelligence technology in the detection of vaccines and medicines for SARS-CoV-2. Eur. Rev. Med. Pharmacol. Sci. 2020, 24, 11977–11981. [Google Scholar] [PubMed]
  18. Yang, L.; Liu, S.; Liu, J.; Zhang, Z.; Wan, X.; Huang, B.; Chen, Y.; Zhang, Y. COVID-19: Immunopathogenesis and Immunotherapeutics. Signal Transduct. Target. Ther. 2020, 5, 128. [Google Scholar] [PubMed]
  19. Tufan, A.; Güler, A.A.; Matucci-Cerinic, M. COVID-19, immune system response, hyperinflammation and repurposingantirheumatic drugs. Turk. J. Med. Sci. 2020, 50, 620–632. [Google Scholar] [CrossRef]
  20. Graham, B.S. Rapid COVID-19 vaccine development. Science 2020, 368, 945–946. [Google Scholar] [CrossRef] [PubMed]
  21. Alsharif, M.H.; Alsharif, Y.H.; Yahya, K.; Alomari, O.A.; Albreem, M.A.; Jahid, A. Deep learning applications to combat the dissemination of COVID-19 disease: A review. Eur. Rev. Med. Pharmacol. Sci. 2020, 24, 11455–11460. [Google Scholar]
  22. Alsharif, M.H.; Alsharif, Y.H.; Chaudhry, S.A.; Albreem, M.A.; Jahid, A.; Hwang, E. Artificial intelligence technology for diagnosing COVID-19 cases: A review of substantial issues. Eur. Rev. Med. Pharmacol. Sci. 2020, 24, 9226–9233. [Google Scholar]
  23. Darapaneni, N.; Singh, A.; Paduri, A.; Ranjith, A.; Kumar, A.; Dixit, D.; Khan, S. A machine learning approach to predicting covid-19 cases amongst suspected cases and their category of admission. In Proceedings of the 2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS), Rupnagar, India, 26–28 November 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 375–380. [Google Scholar]
  24. Ismael, A.M.; Şengür, A. Deep learning approaches for COVID-19 detection based on chest X-ray images. Expert Syst. Appl. 2021, 164, 114054. [Google Scholar] [PubMed]
  25. Lassau, N.; Ammari, S.; Chouzenoux, E.; Gortais, H.; Herent, P.; Devilder, M.; Soliman, S.; Meyrignac, O.; Talabard, M.-P.; Lamarque, J.-P.; et al. Integrating deep learning CT-scan model, biological and clinical variables to predict severity of COVID-19 patients. Nat. Commun. 2021, 12, 634. [Google Scholar] [PubMed]
  26. Pahar, M.; Klopper, M.; Warren, R.; Niesler, T. COVID-19 cough classification using machine learning and global smartphone recordings. Comput. Biol. Med. 2021, 135, 104572. [Google Scholar] [CrossRef] [PubMed]
  27. Wang, X.; Deng, X.; Fu, Q.; Zhou, Q.; Feng, J.; Ma, H.; Liu, W.; Zheng, C. A weakly-supervised framework for COVID-19 classification and lesion localization from chest CT. IEEE Trans. Med. Imaging 2020, 39, 2615–2625. [Google Scholar] [CrossRef] [PubMed]
  28. Minaee, S.; Kafieh, R.; Sonka, M.; Yazdani, S.; Soufie, G. Deep-COVID: Predicting COVID-19 from chest X-ray images using deep transfer learning. Med. Image Anal. 2020, 65, 101794. [Google Scholar] [CrossRef]
  29. Agarwal, M.; Saba, L.; Gupta, S.K.; Carriero, A.; Falaschi, Z.; Paschè, A.; Danna, P.; El-Baz, A.; Naidu, S.; Suri, J. A novel block imaging technique using nine artificial intelligence models for COVID-19 disease classification, characterization and severity measurement in lung computed tomography scans on an Italian cohort. J. Med. Syst. 2021, 45, 1–30. [Google Scholar]
  30. Wang, L.; Lin, Z.Q.; Wong, A. Covid-net: A tailored deep convolutional neural network design for detection of covid-19 cases from chest x-ray images. Sci. Rep. 2020, 10, 1–12. [Google Scholar]
  31. Karmakar, G.; Chowdhury, A.; Das, R.; Kamruzzaman, J.; Islam, S. Assessing trust level of a driverless car using deep learning. IEEE Trans. Intell. Transp. Syst. 2021, 22, 4457–4466. [Google Scholar] [CrossRef]
  32. Ouyang, D.; He, B.; Ghorbani, A.; Yuan, N.; Ebinger, J.; Langlotz, C.P.; Heidenreich, P.A.; Harrington, R.A.; Liang, D.H.; Ashley, E.A.; et al. Video-based AI for beat-to-beat assessment of cardiac function. Nature 2020, 580, 252–256. [Google Scholar]
  33. Das, T.K.; Chowdhary, C.L.; Gao, X.Z. Chest X-ray investigation: A convolutional neural network approach. J. Biomim. Biomater. Biomed. Eng. 2020, 45, 57–70. [Google Scholar] [CrossRef]
  34. Baek, M.; DiMaio, F.; Anishchenko, I.; Dauparas, J.; Ovchinnikov, S.; Lee, G.R.; Wang, J.; Cong, Q.; Kinch, L.N.; Schaeffer, R.D.; et al. Accurate prediction of protein structures and interactions using a three-track neural network. Science 2021, 373, 871–876. [Google Scholar] [CrossRef]
  35. Qiu, S.; Liu, Q.; Zhou, S.; Wu, C. Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 2019, 9, 909. [Google Scholar] [CrossRef]
  36. Szegedy, C.; Zaremba, W.; Sutskever, I.; Goodfellow, I.; Zaremba, W.; Fergus, R.; Erhan, D. Intriguing properties of neural networks. arXiv 2013, arXiv:1312.6199. [Google Scholar]
  37. Castelvecchi, D. Can we open the black box of AI? Nature 2016, 538, 20–23. [Google Scholar] [CrossRef] [PubMed]
  38. Miller, D.J.; Xiang, Z.; Kesidis, G. Adversarial learning targeting deep neural network classification: A comprehensive review of defenses against attacks. Proc. IEEE 2020, 108, 402–433. [Google Scholar] [CrossRef]
  39. Akhtar, N.; Mian, A. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 2018, 6, 14410–14430. [Google Scholar] [CrossRef]
  40. Chakraborty, A.; Alam, M.; Dey, V.; Chattopadhyay, A.; Mukhopadhyay, D. A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 2021, 6, 25–45. [Google Scholar] [CrossRef]
  41. Carlini, N.; Wagner, D. Towards evaluating the robustness of neural networks. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (sp), San Jose, CA, USA, 22–24 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 39–57. [Google Scholar]
  42. Goodfellow, I.J.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. arXiv 2014, arXiv:1412.6572. [Google Scholar]
  43. Kurakin, A.; Goodfellow, I.; Bengio, S. Adversarial machine learning at scale. arXiv 2016, arXiv:1611.01236. [Google Scholar]
  44. Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A. Towards deep learning models resistant to adversarial attacks. arXiv 2017, arXiv:1706.06083. [Google Scholar]
  45. Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial nets. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014; pp. 2672–2680. [Google Scholar]
  46. Xiao, C.; Li, B.; Zhu, J.-Y.; He, W.; Liu, M.; Song, D. Generating adversarial examples with adversarial networks. arXiv 2018, arXiv:1801.02610. [Google Scholar]
  47. Papernot, N.; McDaniel, P.; Jha, S.; Fredrikson, M.; Celik, B.; Swami, A. The limitations of deep learning in adversarial settings. In Proceedings of the 2016 IEEE European symposium on security and privacy (EuroS&P), Saarbrucken, Germany, 21–24 March 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 372–387. [Google Scholar]
  48. Saputro, D.R.S.; Widyaningsih, P. Limited memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) method for the parameter estimation on geographically weighted ordinal logistic regression model (GWOLR). In Proceedings of the 4th International Conference on Research, Implementation, and Education of Mathematics and Science (4th ICRIEMS): Research and Education for Developing Scientific Attitude in Sciences and Mathematics, Yogyakarta, Indonesia, 15–16 May 2017; AIP Publishing LLC: Melville, NY, USA, 2017; Volume 1868, p. 040009. [Google Scholar]
  49. Dong, Y.; Liao, F.; Pang, T.; Su, H.; Zhu, J.; Hu, X.; Li, J. Boosting adversarial attacks with momentum. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018; pp. 9185–9193. [Google Scholar]
  50. Mangla, P.; Jandial, S.; Varshney, S.; Balasubramanian, V.N. Advgan++: Harnessing latent layers for adversary generation. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Korea, 27 October–2 November 2019. [Google Scholar]
  51. Deb, D.; Zhang, J.; Jain, A.K. Advfaces: Adversarial face synthesis. In Proceedings of the 2020 IEEE International Joint Conference on Biometrics (IJCB), Houston, TX, USA, 28 September–1 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–10. [Google Scholar]
  52. Yang, X.; He, X.; Zhao, J.; Zhang, Y.; Zhang, S.; Xie, P. COVID-CT-Dataset: A CT Scan Dataset about COVID-19. arXiv 2020, arXiv:2003.13865. [Google Scholar]
  53. He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 July 2016; pp. 770–778. [Google Scholar]
  54. Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
  55. Kumar, R.; Indrayan, A. Receiver operating characteristic (ROC) curve for medical researchers. Indian Pediatr. 2011, 48, 277–287. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The pipeline of the COVID-19 CT image-based deep learning model.
Figure 1. The pipeline of the COVID-19 CT image-based deep learning model.
Bioengineering 10 00194 g001
Figure 2. The pipeline of adversarial attack against the COVID-19 CT image-based deep learning system.
Figure 2. The pipeline of adversarial attack against the COVID-19 CT image-based deep learning system.
Bioengineering 10 00194 g002
Figure 3. Characteristic results of adversarial image and non-COVID-19 image.
Figure 3. Characteristic results of adversarial image and non-COVID-19 image.
Bioengineering 10 00194 g003
Figure 4. The accuracy for different epsilons.
Figure 4. The accuracy for different epsilons.
Bioengineering 10 00194 g004
Figure 5. The FGSM attack on original images under different epsilons.
Figure 5. The FGSM attack on original images under different epsilons.
Bioengineering 10 00194 g005
Figure 6. The adversarial training pipeline of the COVID-19 CT image-based deep learning system.
Figure 6. The adversarial training pipeline of the COVID-19 CT image-based deep learning system.
Bioengineering 10 00194 g006
Figure 7. The pipeline of the noise detector COVID-19 CT image-based deep learning system.
Figure 7. The pipeline of the noise detector COVID-19 CT image-based deep learning system.
Bioengineering 10 00194 g007
Table 1. The classification of adversarial attack algorithms.
Table 1. The classification of adversarial attack algorithms.
MethodAttackAttack BoxAttack Target
Optimization-based methodJMSA [47]WhiteTarget
L-BFGS [48]WhiteTarget
C&WWhiteTarget
Gradient-based methodFGSMWhiteTarget
BIMWhiteNo target
PGDWhiteNo target
MIM [49]WhiteNo target
Adversarial network-based methodAdvGANWhite–blackNo target
AdvGAN++ [50]
AdvFaces [51]
White–black
White–black
No target
No target
Table 2. The classification of datasets.
Table 2. The classification of datasets.
DatasetCOVID-19 CT ImagesNon-COVID-19 CT Images
Training set279317
Validation set3540
Testing set3540
Total349397
Table 3. The classification accuracy (%) and AUC (%) of the COVID-19 CT image-based deep learning model.
Table 3. The classification accuracy (%) and AUC (%) of the COVID-19 CT image-based deep learning model.
AccuracyAUC
COVID-19 CT image
deep learning model
76.2785.80
Table 4. The effect of epsilons on the accuracy of non-COVID-19 image classification.
Table 4. The effect of epsilons on the accuracy of non-COVID-19 image classification.
EpsilonsPredicted CorrectTotal CT ImagesAccuracy
032400.800
0.132400.800
0.231400.775
0.330400.750
0.422400.550
0.519400.475
0.614400.350
0.77400.175
0.83400.075
0.90400.000
1.00400.000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Y.; Liu, S. The Threat of Adversarial Attack on a COVID-19 CT Image-Based Deep Learning System. Bioengineering 2023, 10, 194. https://doi.org/10.3390/bioengineering10020194

AMA Style

Li Y, Liu S. The Threat of Adversarial Attack on a COVID-19 CT Image-Based Deep Learning System. Bioengineering. 2023; 10(2):194. https://doi.org/10.3390/bioengineering10020194

Chicago/Turabian Style

Li, Yang, and Shaoying Liu. 2023. "The Threat of Adversarial Attack on a COVID-19 CT Image-Based Deep Learning System" Bioengineering 10, no. 2: 194. https://doi.org/10.3390/bioengineering10020194

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop