Training Meta-Surrogate Model for Transferable Adversarial Attack

被引:0
|
作者
Qin, Yunxiao [1 ,2 ]
Xiong, Yuanhao [3 ]
Yi, Jinfeng [4 ]
Hsieh, Cho-Jui [3 ]
机构
[1] Commun Univ China, State Key Lab Media Convergence & Commun, Beijing, Peoples R China
[2] Commun Univ China, Neurosci & Intelligent Media Inst, Beijing, Peoples R China
[3] Univ Calif Los Angeles, Los Angeles, CA USA
[4] JD AI Res, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The problem of adversarial attacks to a black-box model when no queries are allowed has posed a great challenge to the community and has been extensively investigated. In this setting, one simple yet effective method is to transfer the obtained adversarial examples from attacking surrogate models to fool the target model. Previous works have studied what kind of attacks to the surrogate model can generate more transferable adversarial examples, but their performances are still limited due to the mismatches between surrogate models and the target model. In this paper, we tackle this problem from a novel angle-instead of using the original surrogate models, can we obtain a Meta-Surrogate Model (MSM) such that attacks to this model can be easily transferred to other models? We show that this goal can be mathematically formulated as a bi-level optimization problem and design a differentiable attacker to make training feasible. Given one or a set of surrogate models, our method can thus obtain an MSM such that adversarial examples generated on MSM enjoy eximious transferability. Comprehensive experiments on Cifar-10 and ImageNet demonstrate that by attacking the MSM, we can obtain stronger transferable adversarial examples to deceive black-box models including adversarially trained ones, with much higher success rates than existing methods.
引用
收藏
页码:9516 / 9524
页数:9
相关论文
共 50 条
  • [1] Meta-Surrogate Benchmarking for Hyperparameter Optimization
    Klein, Aaron
    Dai, Zhenwen
    Hutter, Frank
    Lawrence, Neil
    Gonzalez, Javier
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [2] AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack
    Wang, Ruikui
    Guo, Yuanfang
    Wang, Yunhong
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 6, 2024, : 5553 - 5562
  • [3] Generative Transferable Adversarial Attack
    Li, Yifeng
    Zhang, Ya
    Zhang, Rui
    Wang, Yanfeng
    ICVIP 2019: PROCEEDINGS OF 2019 3RD INTERNATIONAL CONFERENCE ON VIDEO AND IMAGE PROCESSING, 2019, : 84 - 89
  • [4] Meta-surrogate decision making and artificial intelligence
    Earp, Brian D.
    JOURNAL OF MEDICAL ETHICS, 2022, 48 (05) : 287 - 289
  • [5] TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack
    Wei, Yier
    Gao, Haichang
    Wang, Yufei
    Liu, Huan
    Gao, Yipeng
    Luo, Sainan
    Guo, Qianwen
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT V, 2023, 14258 : 193 - 205
  • [6] Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training
    Di Ming
    Ren, Peng
    Wang, Yunlong
    Feng, Xin
    2024 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2024, : 24696 - 24705
  • [7] Efficient Adversarial Training with Transferable Adversarial Examples
    Zheng, Haizhong
    Zhang, Ziqi
    Gu, Juncheng
    Lee, Honglak
    Prakash, Atul
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 1178 - 1187
  • [8] Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion
    Tao, Fangjian
    Cao, Chunjie
    Li, Hong
    Zou, Binghui
    Wang, Longjuan
    Sun, Jingzhang
    APPLIED SCIENCES-BASEL, 2023, 13 (11):
  • [9] Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization
    Yang, Yulong
    Lin, Chenhao
    Li, Qian
    Zhao, Zhengyu
    Fan, Haoran
    Zhou, Dawei
    Wang, Nannan
    Liu, Tongliang
    Shen, Chao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3265 - 3278
  • [10] Transferable adversarial attack on image tampering localization
    Cao, Gang
    Wang, Yuqi
    Zhu, Haochen
    Lou, Zijie
    Yu, Lifang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 102