Content-based Unrestricted Adversarial Attack

被引:0
|
作者
Chen, Zhaoyu [1 ,2 ]
Li, Bo [2 ]
Wu, Shuang [2 ]
Jiang, Kaixun [1 ]
Ding, Shouhong [2 ]
Zhang, Wenqiang [1 ,3 ]
机构
[1] Fudan Univ, Acad Engn & Technol, Shanghai, Peoples R China
[2] Tencent, Youtu Lab, Shenzhen, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unrestricted adversarial attacks typically manipulate the semantic content of an image (e.g., color or texture) to create adversarial examples that are both effective and photorealistic, demonstrating their ability to deceive human perception and deep neural networks with stealth and success. However, current works usually sacrifice unrestricted degrees and subjectively select some image content to guarantee the photorealism of unrestricted adversarial examples, which limits its attack performance. To ensure the photorealism of adversarial examples and boost attack performance, we propose a novel unrestricted attack framework called Content-based Unrestricted Adversarial Attack. By leveraging a low-dimensional manifold that represents natural images, we map the images onto the manifold and optimize them along its adversarial direction. Therefore, within this framework, we implement Adversarial Content Attack (ACA) based on Stable Diffusion and can generate high transferable unrestricted adversarial examples with various adversarial contents. Extensive experimentation and visualization demonstrate the efficacy of ACA, particularly in surpassing state-of-the-art attacks by an average of 13.3-50.4% and 16.8-48.0% in normally trained models and defense methods, respectively.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Forwarding in a content-based network
    Carzaniga, A
    Wolf, AL
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (04) : 163 - 174
  • [22] Content-Based News Recommendation
    Kompan, Michal
    Bielikova, Maria
    E-COMMERCE AND WEB TECHNOLOGIES, 2010, 61 : 61 - 72
  • [23] Association and content-based retrieval
    Djeraba, C
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (01) : 118 - 135
  • [24] Content-based image retrieval
    Multimedia Tools and Applications, 2023, 82 : 37903 - 37903
  • [25] Content-Based Image Retrieval
    Zaheer, Yasir
    SECOND INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING, 2010, 7546
  • [26] Content-Based Security for the Web
    Afanasyev, Alexander
    Halderman, J. Alex
    Ruoti, Scott
    Seamons, Kent
    Yu, Yingdi
    Zappala, Daniel
    Zhang, Lixia
    PROCEEDINGS OF THE 2016 NEW SECURITY PARADIGMS WORKSHOP (NSPW'16), 2016, : 49 - 60
  • [27] Apperception and content-based psychology
    Pertti, S
    INTERNATIONAL JOURNAL OF PSYCHOLOGY, 2004, 39 (5-6) : 525 - 525
  • [28] The content-based VOD system
    Jia, ZT
    Li, LJ
    He, GM
    DCABES 2001 PROCEEDINGS, 2001, : 75 - 79
  • [29] Coding for content-based retrieval
    Swanson, MD
    Hosur, S
    Tewfik, AH
    1996 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, CONFERENCE PROCEEDINGS, VOLS 1-6, 1996, : 1958 - 1961
  • [30] Content-based Models of Quotation
    MacLaughlin, Ansel
    Smith, David A.
    16TH CONFERENCE OF THE EUROPEAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (EACL 2021), 2021, : 2296 - 2314