Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space

被引:0
|
作者
Wang, Shuo [1 ]
Chen, Shangyu [2 ]
Chen, Tianle [3 ]
Nepal, Surya [1 ]
Rudolph, Carsten [2 ]
Grobler, Marthie [1 ]
机构
[1] CSIRO, Data61 & Cybersecur CRC, Marsfield, NSW 2122, Australia
[2] Monash Univ, Fac Informat Technol, Melbourne, Vic 3800, Australia
[3] Univ Queensland, St Lucia, Qld 4072, Australia
关键词
Adversarial examples; feature manipulation; latent representation; neural networks; variational autoencoder (VAE);
D O I
10.1109/TNNLS.2023.3299408
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The susceptibility of deep neural networks (DNNs) to adversarial intrusions, exemplified by adversarial examples, is well-documented. Conventional attacks implement unstructured, pixel-wise perturbations to mislead classifiers, which often results in a noticeable departure from natural samples and lacks human-perceptible interpretability. In this work, we present an adversarial attack strategy that implements fine-granularity, semantic-meaning-oriented structural perturbations. Our proposed methodology manipulates the semantic attributes of images through the use of disentangled latent codes. We engineer adversarial perturbations by manipulating either a single latent code or a combination thereof. To this end, we propose two unsupervised semantic manipulation strategies: one based on vector-disentangled representation and the other on feature map-disentangled representation, taking into consideration the complexity of the latent codes and the smoothness of the reconstructed images. Our empirical evaluations, conducted extensively on real-world image data, showcase the potency of our attacks, particularly against black-box classifiers. Furthermore, we establish the existence of a universal semantic adversarial example that is agnostic to specific images.
引用
收藏
页码:17070 / 17084
页数:15
相关论文
共 50 条
  • [21] A data-driven adversarial examples recognition framework via adversarial feature genomes
    Chen, Li
    Li, Qi
    Chen, Weiye
    Wang, Zeyu
    Li, Haifeng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 6438 - 6462
  • [22] Generating Adversarial Examples With Conditional Generative Adversarial Net
    Yu, Ping
    Song, Kaitao
    Lu, Jianfeng
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 676 - 681
  • [23] Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency
    Zhang, Chi
    Zhou, Wenbo
    Zhang, Kui
    Zhang, Jie
    Zhang, Weiming
    Yu, Nenghai
    PROCEEDINGS OF THE ACM TURING AWARD CELEBRATION CONFERENCE-CHINA 2024, ACM-TURC 2024, 2024, : 126 - 131
  • [24] Generating Natural Language Adversarial Examples
    Alzantot, Moustafa
    Sharma, Yash
    Elgohary, Ahmed
    Ho, Bo-Jhang
    Srivastava, Mani B.
    Chang, Kai-Wei
    2018 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2018), 2018, : 2890 - 2896
  • [25] Generating Adversarial Examples With Shadow Model
    Zhang, Rui
    Xia, Hui
    Hu, Chunqiang
    Zhang, Cheng
    Liu, Chao
    Xiao, Fu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6283 - 6289
  • [26] Generating Watermarked Speech Adversarial Examples
    Wang, Yumin
    Ye, Jingyu
    Wu, Hanzhou
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 254 - 260
  • [27] ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space
    Wang, Haobo
    Zhu, Chenxi
    Cao, Yangjie
    Zhuang, Yan
    Li, Jie
    Chen, Xianfu
    ELECTRONICS, 2023, 12 (04)
  • [28] Improved Attribute Manipulation in the Latent Space of StyleGAN for Semantic Face Editing
    Rai, Aashish
    Ducher, Clara
    Cooperstock, Jeremy R.
    20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 38 - 43
  • [29] Crafting transferable adversarial examples via contaminating the salient feature variance
    Ren, Yuchen
    Zhu, Hegui
    Sui, Xiaoyan
    Liu, Chong
    INFORMATION SCIENCES, 2023, 644
  • [30] Revisiting the transferability of adversarial examples via source-agnostic adversarial feature inducing method
    Xiao, Yatie
    Zhou, Jizhe
    Chen, Kongyang
    Liu, Zhenbang
    PATTERN RECOGNITION, 2023, 144