DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model

被引:3
|
作者
Liu, Renyang [1 ,2 ]
Jin, Xin [2 ,3 ]
Hu, Dongting [4 ]
Zhang, Jinhong [2 ,3 ]
Wang, Yuanyu [5 ]
Zhang, Jin [5 ]
Zhou, Wei [2 ,3 ]
机构
[1] Yunnan Univ, Sch Informat Sci & Engn, Kunming, Peoples R China
[2] Yunnan Univ, Engn Res Ctr Cyberspace, Kunming, Peoples R China
[3] Yunnan Univ, Natl Pilot Sch Software, Kunming, Peoples R China
[4] Univ Melbourne, Sch Math & Stat, Melbourne, Vic, Australia
[5] Yunnan Univ, Kunming Inst Phys, Kunming, Peoples R China
基金
中国国家自然科学基金;
关键词
deep learning; adversarial attack; adversarial example; normalize flow; spatial transform; ATTACK;
D O I
10.3389/fnbot.2023.1129720
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L-p-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Flow-based model of computer hackers' motivation
    Voiskounsky, AE
    Smyslova, OV
    [J]. CYBERPSYCHOLOGY & BEHAVIOR, 2003, 6 (02): : 171 - 180
  • [22] Flow-based sampling for fermionic lattice field theories
    Albergo, Michael S.
    Kanwar, Gurtej
    Racaniere, Sebastien
    Rezende, Danilo J.
    Urban, Julian M.
    Boyda, Denis
    Cranmer, Kyle
    Hackett, Daniel C.
    Shanahan, Phiala E.
    [J]. PHYSICAL REVIEW D, 2021, 104 (11)
  • [23] Cartoon-Flow: A Flow-Based Generative Adversarial Network for Arbitrary-Style Photo Cartoonization
    Lee, Jieun
    Kim, Hyeonwoo
    Shim, Jonghwa
    Hwang, Eenjun
    [J]. PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 1241 - 1251
  • [24] Flow-based microimmunoassay
    Hayes, MA
    Polson, NA
    Phayre, AN
    Garcia, AA
    [J]. ANALYTICAL CHEMISTRY, 2001, 73 (24) : 5896 - 5902
  • [25] Generating adversarial examples without specifying a target model
    Yang, Gaoming
    Li, Mingwei
    Fang, Xianjing
    Zhang, Ji
    Liang, Xingzhu
    [J]. PEERJ COMPUTER SCIENCE, 2021, 7
  • [26] Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
    Alberto Mozo
    Ángel González-Prieto
    Antonio Pastor
    Sandra Gómez-Canaval
    Edgar Talavera
    [J]. Scientific Reports, 12
  • [27] Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks
    Mozo, Alberto
    Gonzalez-Prieto, Angel
    Pastor, Antonio
    Gomez-Canaval, Sandra
    Talavera, Edgar
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [28] Imperceptible adversarial audio steganography based on psychoacoustic model
    Chen, Lang
    Wang, Rangding
    Dong, Li
    Yan, Diqun
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (17) : 26451 - 26463
  • [29] Imperceptible adversarial audio steganography based on psychoacoustic model
    Lang Chen
    Rangding Wang
    Li Dong
    Diqun Yan
    [J]. Multimedia Tools and Applications, 2023, 82 : 26451 - 26463
  • [30] Flow Simulator - a flow-based network simulator
    Drzewiecki, Lukasz
    Antoniak-Lewandowska, Monika
    [J]. EUROCON 2007: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOLS 1-6, 2007, : 2124 - 2128