Generating Robust Adversarial Examples against Online Social Networks (OSNs)

被引:0
|
作者
Liu, Jun [1 ]
Zhou, Jiantao [1 ]
Wu, Haiwei [1 ]
Sun, Weiwei [2 ]
Tian, Jinyu [3 ]
机构
[1] Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, State Key Lab Internet Things Smart City, Univ Ave, Taipa 999078, Macau, Peoples R China
[2] Alibaba Grp, 699 Wangshang Rd, Hangzhou 310052, Zhejiang, Peoples R China
[3] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Fac Innovat Engn, Weilong Rd, Taipa 999078, Macau, Peoples R China
关键词
Adversarial examples; adversarial images; robustness; online social networks; deep neural networks;
D O I
10.1145/3632528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online Social Networks (OSNs) have blossomed into prevailing transmission channels for images in the modern era. Adversarial examples (AEs) deliberately designed to mislead deep neural networks (DNNs) are found to be fragile against the inevitable lossy operations conducted by OSNs. As a result, the AEs would lose their attack capabilities after being transmitted over OSNs. In this work, we aim to design a new framework for generating robust AEs that can survive the OSN transmission; namely, the AEs before and after the OSN transmission both possess strong attack capabilities. To this end, we first propose a differentiable network termed SImulated OSN (SIO) to simulate the various operations conducted by an OSN. Specifically, the SIO network consists of two modules: (1) a differentiable JPEG layer for approximating the ubiquitous JPEG compression and (2) an encoder-decoder subnetwork for mimicking the remaining operations. Based upon the SIO network, we then formulate an optimization framework to generate robust AEs by enforcing model outputs with and without passing through the SIO to be both misled. Extensive experiments conducted over Facebook, WeChat and QQ demonstrate that our attack methods produce more robust AEs than existing approaches, especially under small distortion constraints; the performance gain in terms of Attack Success Rate (ASR) could be more than 60%. Furthermore, we build a public dataset containing more than 10,000 pairs of AEs processed by Facebook, WeChat or QQ, facilitating future research in the robust AEs generation. The dataset and code are available at https://github.com/csjunjun/RobustOSNAttack.git.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Generating Adversarial Examples with Adversarial Networks
    Xiao, Chaowei
    Li, Bo
    Zhu, Jun-Yan
    He, Warren
    Liu, Mingyan
    Song, Dawn
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 3905 - 3911
  • [2] An efficient framework for generating robust adversarial examples
    Zhang, Lili
    Wang, Xiaoping
    Lu, Kai
    Peng, Shaoliang
    Wang, Xiaodong
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2020, 35 (09) : 1433 - 1449
  • [3] ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples
    Choi, Seok-Hwan
    Shin, Jin-Myeong
    Liu, Peng
    Choi, Yoon-Ho
    IEEE ACCESS, 2022, 10 : 33602 - 33615
  • [4] ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples
    Choi, Seok-Hwan
    Shin, Jin-Myeong
    Liu, Peng
    Choi, Yoon-Ho
    IEEE Access, 2022, 10 : 33602 - 33615
  • [5] Sybil Detection in Online Social Networks (OSNs)
    Bansal, Harpreet
    Misra, Manoj
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 569 - 576
  • [6] Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks
    Taheri, Shayan
    Khormali, Aminollah
    Salem, Milad
    Yuan, Jiann-Shiun
    BIG DATA AND COGNITIVE COMPUTING, 2020, 4 (02) : 1 - 15
  • [7] Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)
    Sun, Weiwei
    Zhou, Jiantao
    Zhu, Shuyuan
    Tang, Yuan Yan
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2018, 14 (01)
  • [8] Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks
    Tang, Pengfei
    Wang, Wenjie
    Lou, Jian
    Xiong, Li
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4145 - 4155
  • [9] Generating Robust Audio Adversarial Examples with Temporal Dependency
    Zhang, Hongting
    Zhou, Pan
    Yan, Qiben
    Liu, Xiao-Yang
    PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 3167 - 3173
  • [10] Image Origin Identification for Online Social Networks (OSNs)
    Sun, Weiwei
    Zhou, Jiantao
    2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1512 - 1515