Blackbox Attacks via Surrogate Ensemble Search

被引:0
|
作者
Cai, Zikui [1 ]
Song, Chengyu [1 ]
Krishnamurthy, Srikanth [1 ]
Roy-Chowdhury, Amit [1 ]
Asif, M. Salman [1 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Blackbox adversarial attacks can be categorized into transfer- and query-based attacks. Transfer methods do not require any feedback from the victim model, but provide lower success rates compared to query-based methods. Query attacks often require a large number of queries for success. To achieve the best of both approaches, recent efforts have tried to combine them, but still require hundreds of queries to achieve high success rates (especially for targeted attacks). In this paper, we propose a novel method for Blackbox Attacks via Surrogate Ensemble Search (BASES) that can generate highly successful blackbox attacks using an extremely small number of queries. We first define a perturbation machine that generates a perturbed image by minimizing a weighted loss function over a fixed set of surrogate models. To generate an attack for a given victim model, we search over the weights in the loss function using queries generated by the perturbation machine. Since the dimension of the search space is small (same as the number of surrogate models), the search requires a small number of queries. We demonstrate that our proposed method achieves better success rate with at least 30x fewer queries compared to state-of-the-art methods on different image classifiers trained with ImageNet (including VGG-19, DenseNet-121, and ResNext-50). In particular, our method requires as few as 3 queries per image (on average) to achieve more than a 90% success rate for targeted attacks and 1-2 queries per image for over a 99% success rate for untargeted attacks. Our method is also effective on Google Cloud Vision API and achieved a 91% untargeted attack success rate with 2.9 queries per image. We also show that the perturbations generated by our proposed method are highly transferable and can be adopted for hard-label blackbox attacks. Furthermore, we argue that BASES can be used to create attacks for a variety of tasks and show its effectiveness for attacks on object detection models. Our code is available at https://github.com/CSIPlab/BASES.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Ensemble-based Blackbox Attacks on Dense Prediction
    Cai, Zikui
    Tan, Yaoteng
    Asif, M. Salman
    2023 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR, 2023, : 4045 - 4055
  • [2] Harmony Search Algorithm with Ensemble of Surrogate Models
    Mohanarangam, Krithikaa
    Mallipeddi, Rammohan
    HARMONY SEARCH ALGORITHM, 2016, 382 : 19 - 28
  • [3] Ranking Variance Reduced Ensemble Attack with Dual Optimization Surrogate Search
    He, Zhichao
    Hu, Cong
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT IV, 2024, 14428 : 212 - 223
  • [4] Polynomial complexity blackbox search: Lessons from the SEARCH framework
    Kargupta, H
    Goldberg, DE
    1996 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '96), PROCEEDINGS OF, 1996, : 792 - 797
  • [5] Blackbox Adversarial Attacks and Explanations for Automatic Speech Recognition
    Wu, Xiaoliang
    PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 1765 - 1769
  • [6] Neural Ensemble Search via Bayesian Sampling
    Shu, Yao
    Chen, Yizhou
    Dai, Zhongxiang
    Low, Bryan Kian Hsiang
    UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, VOL 180, 2022, 180 : 1803 - 1812
  • [7] Improving the transferability of adversarial attacks via self-ensemble
    Cheng, Shuyan
    Li, Peng
    Liu, Jianguo
    Xu, He
    Yao, Yudong
    APPLIED INTELLIGENCE, 2024, 54 (21) : 10608 - 10626
  • [8] Blackbox optimization and surrogate models for machining free-form surfaces
    Herraz, Mahfoud
    Redonnet, Jean-Max
    Sbihi, Mohammed
    Mongeau, Marcel
    COMPUTERS & INDUSTRIAL ENGINEERING, 2023, 177
  • [9] Cube Attacks on Non-Blackbox Polynomials Based on Division Property
    Todo, Yosuke
    Isobe, Takanori
    Hao, Yonglin
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 250 - 279
  • [10] Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
    Zhao, Yiren
    Shumailov, Ilia
    Cui, Han
    Gaol, Xitong
    Mullins, Robert
    Anderson, Ross
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 16 - 24