APDL: an adaptive step size method for white-box adversarial attacks

被引:0
|
作者
Hu, Jiale [1 ,2 ]
Li, Xiang [1 ,2 ]
Liu, Changzheng [1 ,2 ]
Zhang, Ronghua [1 ,2 ]
Tang, Junwei [3 ]
Sun, Yi [1 ,2 ]
Wang, Yuedong [1 ,2 ]
机构
[1] Shihezi Univ, Coll Informat Sci & Technol, Shihezi 832003, Xinjiang, Peoples R China
[2] Xinjiang Prod & Construct Corps, Key Lab Computat Intelligence & Network Informat S, Shihezi, Peoples R China
[3] Wuhan Text Univ, Sch Comp Sci & Artificial Intelligence, Wuhan, Peoples R China
关键词
Adversarial attacks; Deep learning; Image classification; White-box attacks;
D O I
10.1007/s40747-024-01748-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent research has shown that deep learning models are vulnerable to adversarial attacks, including gradient attacks, which can lead to incorrect outputs. The existing gradient attack methods typically rely on repetitive multistep strategies to improve their attack success rates, resulting in longer training times and severe overfitting. To address these issues, we propose an adaptive perturbation-based gradient attack method with dual-loss optimization (APDL). This method adaptively adjusts the single-step perturbation magnitude based on an exponential distance function, thereby accelerating the convergence process. APDL achieves convergence in fewer than 10 iterations, outperforming the traditional nonadaptive methods and achieving a high attack success rate with fewer iterations. Furthermore, to increase the transferability of gradient attacks such as APDL across different models and reduce the effects of overfitting on the training model, we introduce a triple-differential logit fusion (TDLF) method grounded in knowledge distillation principles. This approach mitigates the edge effects associated with gradient attacks by adjusting the hardness and softness of labels. Experiments conducted on ImageNet-compatible datasets demonstrate that APDL is significantly faster than the commonly used nonadaptive methods, whereas the TDLF method exhibits strong transferability.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] A new method for white-box implementation of CLEFIA algorithm
    Yao S.
    Chen J.
    Gong Y.
    Xu D.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2020, 47 (05): : 150 - 158
  • [32] Revisiting Higher-order Computational Attacks against White-box Implementations
    Maghrebi, Houssem
    Alessio, Davide
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 265 - 272
  • [33] Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
    Lu, Jiqiang
    Wang, Mingxue
    Wang, Can
    Yang, Chen
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 328 - 352
  • [34] Regularization Meets Enhanced Multi-Stage Fusion Features: Making CNN More Robust against White-Box Adversarial Attacks
    Zhang, Jiahuan
    Maeda, Keisuke
    Ogawa, Takahiro
    Haseyama, Miki
    SENSORS, 2022, 22 (14)
  • [35] Optimizing Deep Learning Based Intrusion Detection Systems Defense Against White-Box and Backdoor Adversarial Attacks Through a Genetic Algorithm
    Alrawashdeh, Khaled
    Goldsmith, Stephen
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [36] DCVAE-adv: A Universal Adversarial Example Generation Method for White and Black Box Attacks
    Xu, Lei
    Zhai, Junhai
    TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (02): : 430 - 446
  • [37] Black-Box Attacks on Graph Neural Networks via White-Box Methods With Performance Guarantees
    Yang, Jielong
    Ding, Rui
    Chen, Jianyu
    Zhong, Xionghu
    Zhao, Huarong
    Xie, Linbo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18193 - 18204
  • [38] Fast Adversarial Training With Adaptive Step Size
    Huang, Zhichao
    Fan, Yanbo
    Liu, Chen
    Zhang, Weizhong
    Zhang, Yong
    Salzmann, Mathieu
    Susstrunk, Sabine
    Wang, Jue
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2023, 32 : 6102 - 6114
  • [39] Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box
    Chitic, Raluca
    Topal, Ali Osman
    Leprevost, Franck
    APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [40] White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems
    Erba, Alessandro
    Tippenhauer, Nils Ole
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 111 - 131