GM-Attack: Improving the Transferability of Adversarial Attacks

被引:8
|
作者
Hong, Jinbang [1 ,2 ]
Tang, Keke [3 ]
Gao, Chao [2 ]
Wang, Songxin [4 ]
Guo, Sensen [5 ]
Zhu, Peican [2 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710072, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Shaanxi, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Guangdong, Peoples R China
[4] Shanghai Univ Finance & Econ, Sch Informat Management & Engn, Shanghai 200433, Peoples R China
[5] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Deep neural networks; Adversarial attack; Adversarial examples; Data augmentation; White-box/black-box attack; Transferability;
D O I
10.1007/978-3-031-10989-8_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the real world, blackbox attacks seem to be widely existed due to the lack of detailed information of models to be attacked. Hence, it is desirable to obtain adversarial examples with high transferability which will facilitate practical adversarial attacks. Instead of adopting traditional input transformation approaches, we propose a mechanism to derive masked images through removing some regions from the initial input images. In this manuscript, the removed regions are spatially uniformly distributed squares. For comparison, several transferable attack methods are adopted as the baselines. Eventually, extensive empirical evaluations are conducted on the standard ImageNet dataset to validate the effectiveness of GM-Attack. As indicated, our GM-Attack can craft more transferable adversarial examples compared with other input transformation methods and attack success rate on Inc-v4 has been improved by 6.5% over state-of-the-art methods.
引用
收藏
页码:489 / 500
页数:12
相关论文
共 50 条
  • [21] Enhancing adversarial attack transferability with multi-scale feature attack
    Sun, Caixia
    Zou, Lian
    Fan, Cien
    Shi, Yu
    Liu, Yifeng
    INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2021, 19 (02)
  • [22] Boosting the transferability of adversarial attacks with global momentum initialization
    Wang, Jiafeng
    Chen, Zhaoyu
    Jiang, Kaixun
    Yang, Dingkang
    Hong, Lingyi
    Guo, Pinxue
    Guo, Haijing
    Zhang, Wenqiang
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255
  • [23] A STUDY ON THE TRANSFERABILITY OF ADVERSARIAL ATTACKS IN SOUND EVENT CLASSIFICATION
    Subramanian, Vinod
    Pankajakshan, Arjun
    Benetos, Emmanouil
    Xu, Ning
    McDonald, SKoT
    Sandler, Mark
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 301 - 305
  • [24] Enhancing the Transferability of Targeted Attacks with Adversarial Perturbation Transform
    Deng, Zhengjie
    Xiao, Wen
    Li, Xiyan
    He, Shuqian
    Wang, Yizhen
    ELECTRONICS, 2023, 12 (18)
  • [25] Enhancing the Transferability of Adversarial Attacks through Variance Tuning
    Wang, Xiaosen
    He, Kun
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 1924 - 1933
  • [26] Studying the Transferability of Non-Targeted Adversarial Attacks
    Alvarez, Enrique
    Alvarez, Rafael
    Cazorla, Miguel
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [27] Enhancing the transferability of adversarial attacks with diversified input strategies
    Li Z.
    Chen Y.
    Yang B.
    Li C.
    Zhang S.
    Li W.
    Zhang H.
    Journal of Intelligent and Fuzzy Systems, 2024, 46 (04): : 10359 - 10373
  • [28] On the Transferability of Adversarial Attacks against Neural Text Classifier
    Yuan, Liping
    Zheng, Xiaoqing
    Zhou, Yi
    Hsieh, Cho-Jui
    Chang, Kai-Wei
    2021 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2021), 2021, : 1612 - 1625
  • [29] Similarity of Neural Architectures Using Adversarial Attack Transferability
    Hwang, Jaehui
    Han, Dongyoon
    Heo, Byeongho
    Park, Song
    Chun, Sanghyuk
    Lee, Jong-Seok
    COMPUTER VISION - ECCV 2024, PT XXXVII, 2025, 15095 : 106 - 126
  • [30] SGMA: a novel adversarial attack approach with improved transferability
    Peican Zhu
    Jinbang Hong
    Xingyu Li
    Keke Tang
    Zhen Wang
    Complex & Intelligent Systems, 2023, 9 : 6051 - 6063