APDL: an adaptive step size method for white-box adversarial attacks

被引:0
|
作者
Hu, Jiale [1 ,2 ]
Li, Xiang [1 ,2 ]
Liu, Changzheng [1 ,2 ]
Zhang, Ronghua [1 ,2 ]
Tang, Junwei [3 ]
Sun, Yi [1 ,2 ]
Wang, Yuedong [1 ,2 ]
机构
[1] Shihezi Univ, Coll Informat Sci & Technol, Shihezi 832003, Xinjiang, Peoples R China
[2] Xinjiang Prod & Construct Corps, Key Lab Computat Intelligence & Network Informat S, Shihezi, Peoples R China
[3] Wuhan Text Univ, Sch Comp Sci & Artificial Intelligence, Wuhan, Peoples R China
关键词
Adversarial attacks; Deep learning; Image classification; White-box attacks;
D O I
10.1007/s40747-024-01748-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent research has shown that deep learning models are vulnerable to adversarial attacks, including gradient attacks, which can lead to incorrect outputs. The existing gradient attack methods typically rely on repetitive multistep strategies to improve their attack success rates, resulting in longer training times and severe overfitting. To address these issues, we propose an adaptive perturbation-based gradient attack method with dual-loss optimization (APDL). This method adaptively adjusts the single-step perturbation magnitude based on an exponential distance function, thereby accelerating the convergence process. APDL achieves convergence in fewer than 10 iterations, outperforming the traditional nonadaptive methods and achieving a high attack success rate with fewer iterations. Furthermore, to increase the transferability of gradient attacks such as APDL across different models and reduce the effects of overfitting on the training model, we introduce a triple-differential logit fusion (TDLF) method grounded in knowledge distillation principles. This approach mitigates the edge effects associated with gradient attacks by adjusting the hardness and softness of labels. Experiments conducted on ImageNet-compatible datasets demonstrate that APDL is significantly faster than the commonly used nonadaptive methods, whereas the TDLF method exhibits strong transferability.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Gradient Correction for White-Box Adversarial Attacks
    Liu, Hongying
    Ge, Zhijin
    Zhou, Zhenyu
    Shang, Fanhua
    Liu, Yuanyuan
    Jiao, Licheng
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 35 (12) : 1 - 12
  • [2] NOVEL ADVERSARIAL DEFENSE TECHNIQUES FOR WHITE-BOX ATTACKS
    Van Tuinen, Jason
    Ranganath, Aditya
    Konjevod, Goran
    Singhal, Mukesh
    Marcia, Roummel
    2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 617 - 622
  • [3] Generating Adversarial Example with GAN for White-Box Target Attacks
    Zhang G.
    Liu X.
    Shao M.
    Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2020, 33 (09): : 830 - 838
  • [4] Robustness of Bayesian Neural Networks to White-Box Adversarial Attacks
    Uchendu, Adaku
    Campoy, Daniel
    Menart, Christopher
    Hildenbrandt, Alexandra
    2021 IEEE FOURTH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2021), 2021, : 72 - 80
  • [5] Impact of White-Box Adversarial Attacks on Convolutional Neural Networks
    Podder, Rakesh
    Ghosh, Sudipto
    2024 International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2024 - Proceedings, 2024, : 41 - 49
  • [6] Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
    Yunyi ZHOU
    Haichang GAO
    Jianping HE
    Shudong ZHANG
    Zihui WU
    Chinese Journal of Electronics, 2024, 33 (04) : 979 - 988
  • [7] White-box and Black-box Adversarial Attacks to Obstacle Avoidance in Mobile Robots
    Rano, Inaki
    Christensen, Anders Lyhne
    2023 EUROPEAN CONFERENCE ON MOBILE ROBOTS, ECMR, 2023, : 64 - 69
  • [8] Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
    Zhou, Yunyi
    Gao, Haichang
    He, Jianping
    Zhang, Shudong
    Wu, Zihui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (04) : 979 - 988
  • [9] The White-Box Adversarial Data Stream Model
    Ajtai, Miklos
    Braverman, Vladimir
    Jayram, T. S.
    Silwal, Sandeep
    Sun, Alec
    Woodruff, David P.
    Zhou, Samson
    PROCEEDINGS OF THE 41ST ACM SIGMOD-SIGACT-SIGAI SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS (PODS '22), 2022, : 15 - 27
  • [10] Two Attacks on a White-Box AES Implementation
    Lepoint, Tancrede
    Rivain, Matthieu
    De Mulder, Yoni
    Roelse, Peter
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 265 - 285