APDL: an adaptive step size method for white-box adversarial attacks

被引:0
|
作者
Hu, Jiale [1 ,2 ]
Li, Xiang [1 ,2 ]
Liu, Changzheng [1 ,2 ]
Zhang, Ronghua [1 ,2 ]
Tang, Junwei [3 ]
Sun, Yi [1 ,2 ]
Wang, Yuedong [1 ,2 ]
机构
[1] Shihezi Univ, Coll Informat Sci & Technol, Shihezi 832003, Xinjiang, Peoples R China
[2] Xinjiang Prod & Construct Corps, Key Lab Computat Intelligence & Network Informat S, Shihezi, Peoples R China
[3] Wuhan Text Univ, Sch Comp Sci & Artificial Intelligence, Wuhan, Peoples R China
关键词
Adversarial attacks; Deep learning; Image classification; White-box attacks;
D O I
10.1007/s40747-024-01748-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent research has shown that deep learning models are vulnerable to adversarial attacks, including gradient attacks, which can lead to incorrect outputs. The existing gradient attack methods typically rely on repetitive multistep strategies to improve their attack success rates, resulting in longer training times and severe overfitting. To address these issues, we propose an adaptive perturbation-based gradient attack method with dual-loss optimization (APDL). This method adaptively adjusts the single-step perturbation magnitude based on an exponential distance function, thereby accelerating the convergence process. APDL achieves convergence in fewer than 10 iterations, outperforming the traditional nonadaptive methods and achieving a high attack success rate with fewer iterations. Furthermore, to increase the transferability of gradient attacks such as APDL across different models and reduce the effects of overfitting on the training model, we introduce a triple-differential logit fusion (TDLF) method grounded in knowledge distillation principles. This approach mitigates the edge effects associated with gradient attacks by adjusting the hardness and softness of labels. Experiments conducted on ImageNet-compatible datasets demonstrate that APDL is significantly faster than the commonly used nonadaptive methods, whereas the TDLF method exhibits strong transferability.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] On the Convergence of an Adaptive Momentum Method for Adversarial Attacks
    Long, Sheng
    Tao, Wei
    Li, Shuohao
    Lei, Jun
    Zhang, Jun
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 13, 2024, : 14132 - 14140
  • [42] Quantum neural networks under depolarization noise: exploring white-box attacks and defenses
    Winderl, David
    Franco, Nicola
    Lorenz, Jeanette Miriam
    QUANTUM MACHINE INTELLIGENCE, 2024, 6 (02)
  • [43] White-box filtering attacks breaking SEL masking: from exponential to polynomial time
    Charlès, Alex
    Udovenko, Aleksei
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 1 - 24
  • [44] Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures
    Tang Y.
    Gong Z.
    Chen J.
    Xie N.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 369 - 400
  • [45] A White-Box False Positive Adversarial Attack Method on Contrastive Loss Based Offline Handwritten Signature Verification Models
    Guo, Zhongliang
    Li, Weiye
    Qian, Yifei
    Arandjelovic, Ognjen
    Fang, Lei
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 238, 2024, 238
  • [46] Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
    Di Crescenzo, Giovanni
    Bahler, Lisa
    McIntosh, Allen
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [47] Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021
    Bauer, Sven
    Drexler, Hermann
    Gebhardt, Max
    Klein, Dominik
    Laus, Friederike
    Mittmann, Johannes
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 25 - 55
  • [48] wAdvMTD: A Mitigation to White-box Adversarial Examples Using Heterogeneous Models and Moving Target Defense
    Li, Yuanpei
    Zhou, Qinglei
    Li, Shibo
    Li, Bin
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 592 - 597
  • [49] Robustness of Workload Forecasting Models in Cloud Data Centers: A White-Box Adversarial Attack Perspective
    Mahbub, Nosin Ibna
    Hossain, Md. Delowar
    Akhter, Sharmen
    Hossain, Md. Imtiaz
    Jeong, Kimoon
    Huh, Eui-Nam
    IEEE ACCESS, 2024, 12 : 55248 - 55263
  • [50] Adaptive Temporal Grouping for Black-box Adversarial Attacks on Videos
    Wei, Zhipeng
    Chen, Jingjing
    Zhang, Hao
    Jiang, Linxi
    Jiang, Yu-Gang
    PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, ICMR 2022, 2022, : 587 - 593