DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model

被引:3
|
作者
Liu, Renyang [1 ,2 ]
Jin, Xin [2 ,3 ]
Hu, Dongting [4 ]
Zhang, Jinhong [2 ,3 ]
Wang, Yuanyu [5 ]
Zhang, Jin [5 ]
Zhou, Wei [2 ,3 ]
机构
[1] Yunnan Univ, Sch Informat Sci & Engn, Kunming, Peoples R China
[2] Yunnan Univ, Engn Res Ctr Cyberspace, Kunming, Peoples R China
[3] Yunnan Univ, Natl Pilot Sch Software, Kunming, Peoples R China
[4] Univ Melbourne, Sch Math & Stat, Melbourne, Vic, Australia
[5] Yunnan Univ, Kunming Inst Phys, Kunming, Peoples R China
基金
中国国家自然科学基金;
关键词
deep learning; adversarial attack; adversarial example; normalize flow; spatial transform; ATTACK;
D O I
10.3389/fnbot.2023.1129720
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L-p-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Flow-Based Image Abstraction
    Kang, Henry
    Lee, Seungyong
    Chui, Charles K.
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2009, 15 (01) : 62 - 76
  • [42] Flow-Based Simulation Methodology
    Hoseinzadeh, Morteza
    [J]. IEEE COMPUTER ARCHITECTURE LETTERS, 2018, 17 (01) : 51 - 54
  • [43] Flow-based Physical Security
    Al-Fedaghi, Sabah
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 239 - 250
  • [44] Flow-based Analytical Techniques
    Yasutada SuziKl
    [J]. Analytical Sciences, 2018, 34 : 865 - 865
  • [45] A Flow-Based Synthesis of Telmisartan
    Martin, Alex D.
    Siamaki, Ali R.
    Belecki, Katherine
    Gupton, B. Frank
    [J]. JOURNAL OF FLOW CHEMISTRY, 2015, 5 (03) : 145 - 147
  • [46] Flow-based NDN Architecture
    Tan, Xiaobin
    Zhao, Zinfan
    Cheng, Yujiao
    Su, Junxiang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [47] Toward Flow-Based Ontology
    Al-Fedaghi, Sabah
    [J]. SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2016, 653 : 125 - 137
  • [48] Flow-Based Supply Chains
    Al-Fedaghi, Sabah
    [J]. INTERNATIONAL JOINT CONFERENCE ON COMPUTATIONAL SCIENCES AND OPTIMIZATION, VOL 2, PROCEEDINGS, 2009, : 589 - 596
  • [49] Schematization of Flow-Based Production
    Al-Fedaghi, Sabah
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON CONTROL, MECHATRONICS AND AUTOMATION (ICCMA 2015), 2016, 42
  • [50] A Flow-Based Synthesis of Telmisartan
    Alex D. Martin
    Ali R. Siamaki
    Katherine Belecki
    B. Frank Gupton
    [J]. Journal of Flow Chemistry, 2015, 5 : 145 - 147