DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model

被引:3
|
作者
Liu, Renyang [1 ,2 ]
Jin, Xin [2 ,3 ]
Hu, Dongting [4 ]
Zhang, Jinhong [2 ,3 ]
Wang, Yuanyu [5 ]
Zhang, Jin [5 ]
Zhou, Wei [2 ,3 ]
机构
[1] Yunnan Univ, Sch Informat Sci & Engn, Kunming, Peoples R China
[2] Yunnan Univ, Engn Res Ctr Cyberspace, Kunming, Peoples R China
[3] Yunnan Univ, Natl Pilot Sch Software, Kunming, Peoples R China
[4] Univ Melbourne, Sch Math & Stat, Melbourne, Vic, Australia
[5] Yunnan Univ, Kunming Inst Phys, Kunming, Peoples R China
基金
中国国家自然科学基金;
关键词
deep learning; adversarial attack; adversarial example; normalize flow; spatial transform; ATTACK;
D O I
10.3389/fnbot.2023.1129720
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L-p-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples
    Hua, Chengyao
    Zhang, Shigeng
    Wang, Weiping
    Li, Zhankai
    Zhang, Jian
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 361 - 368
  • [2] GENERATING ADVERSARIAL EXAMPLES ON SAR IMAGES BY OPTIMIZING FLOW FIELD DIRECTLY IN FREQUENCY DOMAIN
    Zhang, Lei
    Jiang, Tianpeng
    Gao, Songyi
    Zhang, Yue
    Xu, Mingming
    Liu, Lei
    [J]. 2022 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2022), 2022, : 2979 - 2982
  • [3] Adversarial Robustness of Flow-Based Generative Models
    Pope, Phillip
    Balaji, Yogesh
    Feizi, Soheil
    [J]. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 108, 2020, 108 : 3795 - 3804
  • [4] Field and flow-based separations
    Gaëtane Lespes
    Catia Contado
    Bruce K. Gale
    [J]. Analytical and Bioanalytical Chemistry, 2015, 407 : 4299 - 4300
  • [5] Field and flow-based separations
    Lespes, Gaetane
    Contado, Catia
    Gale, Bruce K.
    [J]. ANALYTICAL AND BIOANALYTICAL CHEMISTRY, 2015, 407 (15) : 4299 - 4300
  • [6] Generating Imperceptible and Cross-Resolution Remote Sensing Adversarial Examples Based on Implicit Neural Representations
    Zhang, Yu
    Chen, Jianqi
    Liu, Liqin
    Chen, Keyan
    Shi, Zhenwei
    Zou, Zhengxia
    [J]. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62 : 1 - 15
  • [7] Generating Adversarial Examples With Shadow Model
    Zhang, Rui
    Xia, Hui
    Hu, Chunqiang
    Zhang, Cheng
    Liu, Chao
    Xiao, Fu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6283 - 6289
  • [8] Multiple flow-based knowledge transfer via adversarial networks
    Yeo, D.
    Bae, J-H
    [J]. ELECTRONICS LETTERS, 2019, 55 (18) : 989 - 991
  • [9] FLOW-BASED POINT CLOUD COMPLETION NETWORK WITH ADVERSARIAL REFINEMENT
    Bao, Rong
    Ren, Yurui
    Li, Ge
    Gao, Wei
    Liu, Shan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2559 - 2563
  • [10] Adversarial Robustness of Flow-based Image Super-Resolution
    Park, Junha
    Choi, Jun-Ho
    Lee, Jong-Seok
    [J]. 2022 IEEE 24TH INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP), 2022,