Content-based Unrestricted Adversarial Attack

被引:0
|
作者
Chen, Zhaoyu [1 ,2 ]
Li, Bo [2 ]
Wu, Shuang [2 ]
Jiang, Kaixun [1 ]
Ding, Shouhong [2 ]
Zhang, Wenqiang [1 ,3 ]
机构
[1] Fudan Univ, Acad Engn & Technol, Shanghai, Peoples R China
[2] Tencent, Youtu Lab, Shenzhen, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unrestricted adversarial attacks typically manipulate the semantic content of an image (e.g., color or texture) to create adversarial examples that are both effective and photorealistic, demonstrating their ability to deceive human perception and deep neural networks with stealth and success. However, current works usually sacrifice unrestricted degrees and subjectively select some image content to guarantee the photorealism of unrestricted adversarial examples, which limits its attack performance. To ensure the photorealism of adversarial examples and boost attack performance, we propose a novel unrestricted attack framework called Content-based Unrestricted Adversarial Attack. By leveraging a low-dimensional manifold that represents natural images, we map the images onto the manifold and optimize them along its adversarial direction. Therefore, within this framework, we implement Adversarial Content Attack (ACA) based on Stable Diffusion and can generate high transferable unrestricted adversarial examples with various adversarial contents. Extensive experimentation and visualization demonstrate the efficacy of ACA, particularly in surpassing state-of-the-art attacks by an average of 13.3-50.4% and 16.8-48.0% in normally trained models and defense methods, respectively.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Content-Based Spam Filtering
    Almeida, Tiago A.
    Yamakami, Akebo
    2010 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS IJCNN 2010, 2010,
  • [42] The research of content-based BCTIIS
    Miao, YM
    Miao, YS
    Xie, WH
    2003 IEEE NUCLEAR SCIENCE SYMPOSIUM, CONFERENCE RECORD, VOLS 1-5, 2004, : 2730 - 2734
  • [43] Content-based matching method
    Li, F
    Zhou, YH
    JOURNAL OF INFRARED AND MILLIMETER WAVES, 2000, 19 (01) : 38 - 42
  • [44] Invariance in content-based retrieval
    Smeulders, A
    Gevers, T
    Geusebroek, JM
    Worring, M
    2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, 2000, : 675 - 678
  • [45] Content-Based Music Classification
    Lo, Yu-Lung
    Lin, Yi-Chang
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 112 - 116
  • [47] Content-Based Image Retrial Based on Hadoop
    Yin, DongSheng
    Liu, DeBo
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [48] Cognitive content engagement in content-based language teaching
    Kong, Stella
    Hoare, Philip
    LANGUAGE TEACHING RESEARCH, 2011, 15 (03) : 307 - 324
  • [49] Average Gradient-Based Adversarial Attack
    Wan, Chen
    Huang, Fangjun
    Zhao, Xianfeng
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 9572 - 9585
  • [50] Perturbing and Backtracking Based Textual Adversarial Attack
    Qiao, Yuanxin
    Xie, Ruilin
    Xie, Songcheng
    Cui, Zhanqi
    Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, 2024, : 142 - 147