Diffusion Models for Imperceptible and Transferable Adversarial Attack

被引:3
|
作者
Chen, Jianqi [1 ,2 ]
Chen, Hao [2 ]
Chen, Keyan [1 ,2 ]
Zhang, Yilan [1 ,2 ]
Zou, Zhengxia [3 ]
Shi, Zhenwei [1 ,2 ]
机构
[1] Beihang Univ, Image Proc Ctr, Sch Astronaut, State Key Lab Virtual Real Technol & Syst, Beijing 100191, Peoples R China
[2] Shanghai Artificial Intelligence Lab, Shanghai 200232, Peoples R China
[3] Beihang Univ, Sch Astronaut, Dept Guidance Nav & Control, Beijing 100191, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Diffusion models; Perturbation methods; Closed box; Noise reduction; Solid modeling; Image color analysis; Glass box; Semantics; Gaussian noise; Purification; Adversarial attack; diffusion model; imperceptible attack; transferable attack;
D O I
10.1109/TPAMI.2024.3480519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many existing adversarial attacks generate L-p -norm perturbations on image RGB space. Despite some achievements in transferability and attack success rate, the crafted adversarial examples are easily perceived by human eyes. Towards visual imperceptibility, some recent works explore unrestricted attacks without L-p -norm constraints, yet lacking transferability of attacking black-box models. In this work, we propose a novel imperceptible and transferable attack by leveraging both the generative and discriminative power of diffusion models. Specifically, instead of direct manipulation in pixel space, we craft perturbations in the latent space of diffusion models. Combined with well-designed content-preserving structures, we can generate human-insensitive perturbations embedded with semantic clues. For better transferability, we further "deceive" the diffusion model which can be viewed as an implicit recognition surrogate, by distracting its attention away from the target regions. To our knowledge, our proposed method, DiffAttack , is the first that introduces diffusion models into the adversarial attack field. Extensive experiments conducted across diverse model architectures (CNNs, Transformers, and MLPs), datasets (ImageNet, CUB-200, and Standford Cars), and defense mechanisms underscore the superiority of our attack over existing methods such as iterative attacks, GAN-based attacks, and ensemble attacks. Furthermore, we provide a comprehensive discussion on future research avenues in diffusion-based adversarial attacks, aiming to chart a course for this burgeoning field.
引用
收藏
页码:961 / 977
页数:17
相关论文
共 50 条
  • [21] Push & Pull: Transferable Adversarial Examples With Attentive Attack
    Gao, Lianli
    Huang, Zijie
    Song, Jingkuan
    Yang, Yang
    Shen, Heng Tao
    IEEE TRANSACTIONS ON MULTIMEDIA, 2022, 24 : 2329 - 2338
  • [22] An Enhanced Transferable Adversarial Attack Against Object Detection
    Shi, Guoqiang
    Lin, Zhi
    Peng, Anjie
    Zeng, Hui
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [23] Black-Box Transferable Adversarial Attack Method Based on Generative Adversarial Networks for Lung Disease Diagnosis Models
    Wang X.
    Wang D.
    Sun J.
    Yang Y.
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2023, 57 (10): : 196 - 206and220
  • [24] Imperceptible Adversarial Attack With Multigranular Spatiotemporal Attention for Video Action Recognition
    Wu, Guoming
    Xu, Yangfan
    Li, Jun
    Shi, Zhiping
    Liu, Xianglong
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17785 - 17796
  • [25] Transferable Waveform-level Adversarial Attack against Speech Anti-spoofing Models
    Huang, Bingyuan
    Cui, Sanshuai
    Kang, Xiangui
    Li, Enping
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 2315 - 2320
  • [26] AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability
    Dunston, Snofy D.
    Rajam, V. Mary Anita
    COMPUTERS & SECURITY, 2024, 136
  • [27] WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing
    Xu, Leiyang
    Zheng, Xiaolong
    Li, Xiangyuan
    Zhang, Yucheng
    Liu, Liang
    Ma, Huadong
    2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2022, : 10 - 18
  • [28] Imperceptible adversarial attack via spectral sensitivity of human visual system
    Chiang, Chen-Kuo
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Lin, Po-Ching
    Chang, Shih-Ya
    Li, Hao-Ting
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (20) : 59291 - 59315
  • [29] Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
    Liu, Shengcai
    Lu, Ning
    Hong, Wenjing
    Qian, Chao
    Tang, Ke
    ACM Transactions on Evolutionary Learning and Optimization, 2024, 4 (03):
  • [30] Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models
    Zhang, Shenyi
    Zheng, Baolin
    Jiang, Peipei
    Zhao, Lingchen
    Shen, Chao
    Wang, Qian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3164 - 3177