Blackbox Attacks via Surrogate Ensemble Search

被引:0
|
作者
Cai, Zikui [1 ]
Song, Chengyu [1 ]
Krishnamurthy, Srikanth [1 ]
Roy-Chowdhury, Amit [1 ]
Asif, M. Salman [1 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Blackbox adversarial attacks can be categorized into transfer- and query-based attacks. Transfer methods do not require any feedback from the victim model, but provide lower success rates compared to query-based methods. Query attacks often require a large number of queries for success. To achieve the best of both approaches, recent efforts have tried to combine them, but still require hundreds of queries to achieve high success rates (especially for targeted attacks). In this paper, we propose a novel method for Blackbox Attacks via Surrogate Ensemble Search (BASES) that can generate highly successful blackbox attacks using an extremely small number of queries. We first define a perturbation machine that generates a perturbed image by minimizing a weighted loss function over a fixed set of surrogate models. To generate an attack for a given victim model, we search over the weights in the loss function using queries generated by the perturbation machine. Since the dimension of the search space is small (same as the number of surrogate models), the search requires a small number of queries. We demonstrate that our proposed method achieves better success rate with at least 30x fewer queries compared to state-of-the-art methods on different image classifiers trained with ImageNet (including VGG-19, DenseNet-121, and ResNext-50). In particular, our method requires as few as 3 queries per image (on average) to achieve more than a 90% success rate for targeted attacks and 1-2 queries per image for over a 99% success rate for untargeted attacks. Our method is also effective on Google Cloud Vision API and achieved a 91% untargeted attack success rate with 2.9 queries per image. We also show that the perturbations generated by our proposed method are highly transferable and can be adopted for hard-label blackbox attacks. Furthermore, we argue that BASES can be used to create attacks for a variety of tasks and show its effectiveness for attacks on object detection models. Our code is available at https://github.com/CSIPlab/BASES.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] On the Ensemble of Surrogate Models by Minimum Screening Index
    Zhang, Shuai
    Pang, Yong
    Liang, Pengwei
    Song, Xueguan
    JOURNAL OF MECHANICAL DESIGN, 2022, 144 (07)
  • [32] Stochastic mesh adaptive direct search for blackbox optimization using probabilistic estimates
    Audet, Charles
    Dzahini, Kwassi Joseph
    Kokkolaras, Michael
    Le Digabel, Sebastien
    COMPUTATIONAL OPTIMIZATION AND APPLICATIONS, 2021, 79 (01) : 1 - 34
  • [33] An ensemble optimizer with a stacking ensemble surrogate model for identification of groundwater contamination source
    Zhu, Liuzhi
    Lu, Wenxi
    Luo, Chengming
    Xu, Yaning
    Wang, Zibo
    JOURNAL OF CONTAMINANT HYDROLOGY, 2024, 267
  • [34] Detecting IoT Botnet Attacks through Ensemble and Meta Ensemble Approaches
    Ma, Xiangjun
    He, Jingsha
    Nazir, Ahsan
    Zhu, Nafei
    Hu, Xiao
    Ullah, Faheem
    Wajahat, Ahsan
    Luo, Yehong
    Qureshi, Sirajuddin
    International Journal of Network Security, 2024, 26 (05): : 885 - 900
  • [35] LateBA: Latent Backdoor Attacks on Deep Bug Search via Infrequent Execution Codes
    Yi, Xiaoyu
    Li, Gaolei
    Huang, Wenkai
    Li, Jianhua
    Lin, Xi
    Liu, Yuchen
    PROCEEDINGS OF THE 15TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2024, 2024, : 427 - 436
  • [36] The search for surrogate endpoints for immunotherapy trials
    Buyse, Marc
    Burzykowski, Tomasz
    Saad, Everardo D.
    ANNALS OF TRANSLATIONAL MEDICINE, 2018, 6 (11)
  • [37] Surrogate-assisted coevolutionary search
    Ong, YS
    Keane, AJ
    Nair, PB
    ICONIP'02: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING: COMPUTATIONAL INTELLIGENCE FOR THE E-AGE, 2002, : 1140 - 1145
  • [38] Ensemble of cuckoo search variants
    Cheng, Jiatang
    Wang, Lei
    Xiong, Yan
    COMPUTERS & INDUSTRIAL ENGINEERING, 2019, 135 : 299 - 313
  • [39] Efficient Search with an Ensemble of Heuristics
    Phillips, Mike
    Narayanan, Venkatraman
    Aine, Sandip
    Likhachev, Maxim
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 784 - 791
  • [40] AN IMPROVED ENSEMBLE APPROACH FOR DOS ATTACKS DETECTION
    Alguliyev, R. M.
    Aliguliyev, R. M.
    Imamverdiyev, Y. N.
    Sukhostat, L., V
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (02) : 73 - 82