Towards Transferable Adversarial Attacks with Centralized Perturbation

被引:0
|
作者
Wu, Shangbo [1 ]
Tan, Yu-an [1 ]
Wang, Yajie [1 ]
Ma, Ruinan [1 ]
Ma, Wencong [2 ]
Li, Yuanzhang [2 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
EXAMPLES;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial transferability enables black-box attacks on unknown victim deep neural networks (DNNs), rendering attacks viable in real-world scenarios. Current transferable attacks create adversarial perturbation over the entire image, resulting in excessive noise that overfit the source model. Concentrating perturbation to dominant image regions that are model-agnostic is crucial to improving adversarial efficacy. However, limiting perturbation to local regions in the spatial domain proves inadequate in augmenting transferability. To this end, we propose a transferable adversarial attack with fine-grained perturbation optimization in the frequency domain, creating centralized perturbation. We devise a systematic pipeline to dynamically constrain perturbation optimization to dominant frequency coefficients. The constraint is optimized in parallel at each iteration, ensuring the directional alignment of perturbation optimization with model prediction. Our approach allows us to centralize perturbation towards sample-specific important frequency features, which are shared by DNNs, effectively mitigating source model overfitting. Experiments demonstrate that by dynamically centralizing perturbation on dominating frequency coefficients, crafted adversarial examples exhibit stronger transferability, and allowing them to bypass various defenses.
引用
收藏
页码:6109 / 6116
页数:8
相关论文
共 50 条
  • [31] Adversarial Stylometry in the Wild: Transferable Lexical Substitution Attacks on Author Profiling
    Emmery, Chris
    Kadar, Akos
    Chrupala, Grzegorz
    16TH CONFERENCE OF THE EUROPEAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (EACL 2021), 2021, : 2388 - 2402
  • [32] CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models
    Sun, Zheng
    Zhao, Jinxiao
    Guo, Feng
    Chen, Yuxuan
    Ju, Lei
    CYBERSECURITY, 2024, 7 (01):
  • [33] Black-box transferable adversarial attacks based on ensemble advGAN
    Huang S.-N.
    Li Y.-X.
    Mao Y.-H.
    Ban A.-Y.
    Zhang Z.-Y.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (10): : 2391 - 2398
  • [34] Transferable adversarial attack based on sensitive perturbation analysis in frequency domain ☆
    Liu, Yong
    Li, Chen
    Wang, Zichi
    Wu, Hanzhou
    Zhang, Xinpeng
    INFORMATION SCIENCES, 2024, 678
  • [35] Feature-aware transferable adversarial attacks against image classification
    Cheng, Shuyan
    Li, Peng
    Han, Keji
    Xu, He
    APPLIED SOFT COMPUTING, 2024, 161
  • [36] Generating transferable adversarial examples based on perceptually-aligned perturbation
    Hongqiao Chen
    Keda Lu
    Xianmin Wang
    Jin Li
    International Journal of Machine Learning and Cybernetics, 2021, 12 : 3295 - 3307
  • [37] Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization
    Yang, Yulong
    Lin, Chenhao
    Li, Qian
    Zhao, Zhengyu
    Fan, Haoran
    Zhou, Dawei
    Wang, Nannan
    Liu, Tongliang
    Shen, Chao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3265 - 3278
  • [38] Generating transferable adversarial examples based on perceptually-aligned perturbation
    Chen, Hongqiao
    Lu, Keda
    Wang, Xianmin
    Li, Jin
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (11) : 3295 - 3307
  • [39] Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
    Dong, Yinpeng
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4307 - 4316
  • [40] Transferable Adversarial Attacks against Automatic Modulation Classifier in Wireless Communications
    Hu, Lin
    Jiang, Han
    Li, Wen
    Han, Hao
    Yang, Yang
    Jiao, Yutao
    Wang, Haichao
    Xu, Yuhua
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022