Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks

被引:0
|
作者
Yan, Ziang [1 ,3 ]
Guo, Yiwen [2 ,3 ]
Zhang, Changshui [1 ]
机构
[1] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol BNRis, State Key Lab Intelligent Technol & Syst, Inst Artificial Intelligence,THUAI,Dept Automat, Beijing, Peoples R China
[2] Bytedance AI Lab, Beijing, Peoples R China
[3] Intel Labs China, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unlike the white-box counterparts that are widely studied and readily accessible, adversarial examples in black-box settings are generally more Herculean on account of the difficulty of estimating gradients. Many methods achieve the task by issuing numerous queries to target classification systems, which makes the whole procedure costly and suspicious to the systems. In this paper, we aim at reducing the query complexity of black-box attacks in this category. We propose to exploit gradients of a few reference models which arguably span some promising search subspaces. Experimental results show that, in comparison with the state-of-the-arts, our method can gain up to 2x and 4x reductions in the requisite mean and medium numbers of queries with much lower failure rates even if the reference models are trained on a small and inadequate dataset disjoint to the one for training the victim model. Code and models for reproducing our results are available at https://github.com/ZiangYan/subspace-attack.pytorch.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Query-based Local Black-box Adversarial Attacks
    Shi, Jing
    Zhang, Xiaolin
    Xu, Enhui
    Wang, Yongping
    Zhang, Wenwen
    [J]. International Journal of Network Security, 2023, 25 (06) : 1048 - 1058
  • [32] Black-Box Based Limited Query Membership Inference Attack
    Zhang, Yu
    Zhou, Huaping
    Wang, Pengyan
    Yang, Gaoming
    [J]. IEEE ACCESS, 2022, 10 : 55459 - 55468
  • [33] Improved black-box attack based on query and perturbation distribution
    Zhao, Weiwei
    Zeng, Zhigang
    [J]. 2021 13TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2021, : 117 - 125
  • [34] Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
    Shukla, Satya Narayan
    Sahu, Anit Kumar
    Willmott, Devin
    Kolter, Zico
    [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1461 - 1469
  • [35] Spanning attack: reinforce black-box attacks with unlabeled data
    Lu Wang
    Huan Zhang
    Jinfeng Yi
    Cho-Jui Hsieh
    Yuan Jiang
    [J]. Machine Learning, 2020, 109 : 2349 - 2368
  • [36] Black-box adversarial attacks on XSS attack detection model
    Wang, Qiuhua
    Yang, Hui
    Wu, Guohua
    Choo, Kim-Kwang Raymond
    Zhang, Zheng
    Miao, Gongxun
    Ren, Yizhi
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [37] Spanning attack: reinforce black-box attacks with unlabeled data
    Wang, Lu
    Zhang, Huan
    Yi, Jinfeng
    Hsieh, Cho-Jui
    Jiang, Yuan
    [J]. MACHINE LEARNING, 2020, 109 (12) : 2349 - 2368
  • [38] A discrete cosine transform-based query efficient attack on black-box object detectors
    Kuang, Xiaohui
    Gao, Xianfeng
    Wang, Lianfang
    Zhao, Gang
    Ke, Lishan
    Zhang, Quanxin
    [J]. INFORMATION SCIENCES, 2021, 546 : 596 - 607
  • [39] Improving query efficiency of black-box attacks via the preference of models
    Yang, Xiangyuan
    Lin, Jie
    Zhang, Hanlin
    Zhao, Peng
    [J]. INFORMATION SCIENCES, 2024, 678
  • [40] A low-query black-box adversarial attack based on transferability
    Ding, Kangyi
    Liu, Xiaolei
    Niu, Weina
    Hu, Teng
    Wang, Yanping
    Zhang, Xiaosong
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 226