Diffusion Models for Imperceptible and Transferable Adversarial Attack

被引:3
|
作者
Chen, Jianqi [1 ,2 ]
Chen, Hao [2 ]
Chen, Keyan [1 ,2 ]
Zhang, Yilan [1 ,2 ]
Zou, Zhengxia [3 ]
Shi, Zhenwei [1 ,2 ]
机构
[1] Beihang Univ, Image Proc Ctr, Sch Astronaut, State Key Lab Virtual Real Technol & Syst, Beijing 100191, Peoples R China
[2] Shanghai Artificial Intelligence Lab, Shanghai 200232, Peoples R China
[3] Beihang Univ, Sch Astronaut, Dept Guidance Nav & Control, Beijing 100191, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Diffusion models; Perturbation methods; Closed box; Noise reduction; Solid modeling; Image color analysis; Glass box; Semantics; Gaussian noise; Purification; Adversarial attack; diffusion model; imperceptible attack; transferable attack;
D O I
10.1109/TPAMI.2024.3480519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many existing adversarial attacks generate L-p -norm perturbations on image RGB space. Despite some achievements in transferability and attack success rate, the crafted adversarial examples are easily perceived by human eyes. Towards visual imperceptibility, some recent works explore unrestricted attacks without L-p -norm constraints, yet lacking transferability of attacking black-box models. In this work, we propose a novel imperceptible and transferable attack by leveraging both the generative and discriminative power of diffusion models. Specifically, instead of direct manipulation in pixel space, we craft perturbations in the latent space of diffusion models. Combined with well-designed content-preserving structures, we can generate human-insensitive perturbations embedded with semantic clues. For better transferability, we further "deceive" the diffusion model which can be viewed as an implicit recognition surrogate, by distracting its attention away from the target regions. To our knowledge, our proposed method, DiffAttack , is the first that introduces diffusion models into the adversarial attack field. Extensive experiments conducted across diverse model architectures (CNNs, Transformers, and MLPs), datasets (ImageNet, CUB-200, and Standford Cars), and defense mechanisms underscore the superiority of our attack over existing methods such as iterative attacks, GAN-based attacks, and ensemble attacks. Furthermore, we provide a comprehensive discussion on future research avenues in diffusion-based adversarial attacks, aiming to chart a course for this burgeoning field.
引用
收藏
页码:961 / 977
页数:17
相关论文
共 50 条
  • [31] Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models
    Guo, Qi
    Pang, Shanmin
    Jia, Xiaojun
    Liu, Yang
    Guo, Qing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1333 - 1348
  • [32] Transferable Sparse Adversarial Attack on Modulation Recognition With Generative Networks
    Jiang, Zenghui
    Zeng, Weijun
    Zhou, Xingyu
    Chen, Pu
    Yin, Shenqian
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (05) : 999 - 1003
  • [33] Intermediate-Layer Transferable Adversarial Attack With DNN Attention
    Yang, Shanshan
    Yang, Yu
    Zhou, Linna
    Zhan, Rui
    Man, Yufei
    IEEE ACCESS, 2022, 10 : 95451 - 95461
  • [34] Training Meta-Surrogate Model for Transferable Adversarial Attack
    Qin, Yunxiao
    Xiong, Yuanhao
    Yi, Jinfeng
    Hsieh, Cho-Jui
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 8, 2023, : 9516 - 9524
  • [35] Transferable Interpolated Adversarial Attack with Random-Layer Mixup
    Ma, Size
    Han, Keji
    Long, Xianzhong
    Li, Yun
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT II, 2022, 13281 : 224 - 235
  • [36] Black-box Bayesian adversarial attack with transferable priors
    Shudong Zhang
    Haichang Gao
    Chao Shu
    Xiwen Cao
    Yunyi Zhou
    Jianping He
    Machine Learning, 2024, 113 : 1511 - 1528
  • [37] Improving transferable adversarial attack via feature-momentum
    He, Xianglong
    Li, Yuezun
    Qu, Haipeng
    Dong, Junyu
    COMPUTERS & SECURITY, 2023, 128
  • [38] AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack
    Wang, Ruikui
    Guo, Yuanfang
    Wang, Yunhong
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 6, 2024, : 5553 - 5562
  • [39] AN ENHANCED TRANSFERABLE ADVERSARIAL ATTACK OF SCALE-INVARIANT METHODS
    Lin, Zhi
    Peng, Anjie
    Wei, Rong
    Yu, Wenxin
    Zeng, Hui
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 3788 - 3792
  • [40] Towards the transferable audio adversarial attack via ensemble methods
    Guo, Feng
    Sun, Zheng
    Chen, Yuxuan
    Ju, Lei
    CYBERSECURITY, 2023, 6 (01)