Boosting the Adversarial Transferability of Surrogate Models with Dark Knowledge

被引:0
|
作者
Yang, Dingcheng [1 ,2 ]
Xiao, Zihao [2 ]
Yu, Wenjian [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci Tech, BNRist, Beijing, Peoples R China
[2] RealAI, Beijing, Peoples R China
关键词
Deep learning; Image classification; Black-box adversarial attack; Transfer-based attack; Dark knowledge;
D O I
10.1109/ICTAI59109.2023.00098
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep neural networks (DNNs) are vulnerable to adversarial examples. And, the adversarial examples have transferability, which means that an adversarial example for a DNN model can fool another model with a non-trivial probability. This gave birth to the transfer-based attack where the adversarial examples generated by a ate model are used to conduct black-box attacks. There are some work on generating the adversarial examples from a given surrogate model with better transferability. However, training a special surrogate model to generate adversarial examples with better transferability is relatively under-explored. This paper proposes a method for training a surrogate model with dark knowledge to boost the transferability of the adversarial examples generated by the surrogate model. This trained surrogate model is named dark surrogate model (DSM). The proposed method for training a DSM consists of two key components: a teacher model extracting dark knowledge, and the mixing augmentation skill enhancing dark knowledge of training data. We conducted extensive experiments to show that the proposed method can substantially improve the adversarial transferability of surrogate models across different architectures of surrogate models and optimizers for generating adversarial examples, and it can be applied to other scenarios of transfer-based attack that contain dark knowledge, like face verification. Our code is publicly available at https://github.com/ydc123/Dark Surrogate Model.
引用
收藏
页码:627 / 635
页数:9
相关论文
共 50 条
  • [31] Boosting Adversarial Transferability across Model Genus by Deformation-Constrained Warping
    Lin, Qinliang
    Luo, Cheng
    Niu, Zenghao
    He, Xilin
    Xie, Weicheng
    Hou, Yuanbo
    Shen, Linlin
    Song, Siyang
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 4, 2024, : 3459 - 3467
  • [32] Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks
    Li, Jian-Wei
    Shao, Wen-Ze
    Sun, Yu-Bao
    Wang, Li-Qian
    Ge, Qi
    Xiao, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3489 - 3504
  • [33] MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation
    Guo, Sensen
    Li, Xiaoyu
    Zhu, Peican
    Wang, Baocang
    Mu, Zhiying
    Zhao, Jinxiong
    INFORMATION SCIENCES, 2024, 657
  • [34] Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent
    Zhao, Lei
    Liu, Zhizhi
    Wu, Sixing
    Chen, Wei
    Wu, Liwen
    Pu, Bin
    Yao, Shaowen
    IET INFORMATION SECURITY, 2024, 2024
  • [35] Boosting transferability of adversarial samples via saliency distribution and frequency domain enhancement
    Wang, Yixuan
    Hong, Wei
    Zhang, Xueqin
    Zhang, Qing
    Gu, Chunhua
    KNOWLEDGE-BASED SYSTEMS, 2024, 300
  • [36] Boosting transferability of targeted adversarial examples with non-robust feature alignment
    Zhu, Hegui
    Sui, Xiaoyan
    Ren, Yuchen
    Jia, Yanmeng
    Zhang, Libo
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 227
  • [37] Detecting Adversarial Examples Using Surrogate Models
    Feldsar, Borna
    Mayer, Rudolf
    Rauber, Andreas
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2023, 5 (04): : 1796 - 1825
  • [38] Generating Adversarial Examples with Better Transferability via Masking Unimportant Parameters of Surrogate Model
    Yang, Dingcheng
    Yu, Wenjian
    Xiao, Zihao
    Luo, Jiaqi
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [39] Boosting Adversarial Transferability Through Adaptive-Learning-Rate with Data Augmentation Mechanism
    Bao L.
    Tao W.
    Tao Q.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (01): : 157 - 169
  • [40] Adaptive Multi-scale Degradation-Based Attack for Boosting the Adversarial Transferability
    Ran, Ran
    Wei, Jiwei
    Zhang, Chaoning
    Wang, Guoqing
    Yang, Yang
    Shen, Heng Tao
    IEEE TRANSACTIONS ON MULTIMEDIA, 2024, 26 : 10979 - 10990