Effective Universal Unrestricted Adversarial Attacks Using a MOE Approach

被引:0
|
作者
Baia, Alina Elena [1 ]
Di Bari, Gabriele [1 ]
Poggioni, Valentina [1 ]
机构
[1] Univ Perugia, Perugia, Italy
关键词
Universal adversarial attacks; Evolutionary algorithms; Multi-objective optimization; Deep learning; ALGORITHM;
D O I
10.1007/978-3-030-72699-7_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent studies have shown that Deep Leaning models are susceptible to adversarial examples, which are data, in general images, intentionally modified to fool a machine learning classifier. In this paper, we present a multi-objective nested evolutionary algorithm to generate universal unrestricted adversarial examples in a black-box scenario. The unrestricted attacks are performed through the application of well-known image filters that are available in several image processing libraries, modern cameras, and mobile applications. The multi-objective optimization takes into account not only the attack success rate but also the detection rate. Experimental results showed that this approach is able to create a sequence of filters capable of generating very effective and undetectable attacks.
引用
收藏
页码:552 / 567
页数:16
相关论文
共 50 条
  • [21] Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving
    Zhou, Man
    Zhou, Wenyu
    Huang, Jie
    Yang, Junhui
    Du, Minxin
    Li, Qi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6795 - 6809
  • [22] Enhancing EEG Signal Classifier Robustness Against Adversarial Attacks Using a Generative Adversarial Network Approach
    Aissa N.E.H.S.B.
    Kerrache C.A.
    Korichi A.
    Lakas A.
    Belkacem A.N.
    IEEE Internet of Things Magazine, 2024, 7 (03): : 44 - 49
  • [23] Adversarial Initialization with Universal Adversarial Perturbation: A New Approach to Fast Adversarial Training
    Pan, Chao
    Li, Qing
    Yao, Xin
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 19, 2024, : 21501 - 21509
  • [24] PID-Based Approach to Adversarial Attacks
    Wan, Chen
    Ye, Biaohua
    Huang, Fangjun
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 10033 - 10040
  • [25] Hoplite Antivirus for Adversarial Attacks: A Theoretical Approach
    Nikolakopoulos, Anastasios
    Marinakis, Achilleas
    Moulos, Vrettos
    Varvarigou, Theodora
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES (WEBIST), 2021, : 585 - 592
  • [26] Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects
    Rasheed, Bader
    Khan, Adil
    Ahmad, Muhammad
    Mazzara, Manuel
    Kazmi, S. M. Ahsan
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2022, 2022
  • [27] Universal adversarial attacks on deep neural networks for medical image classification
    Hokuto Hirano
    Akinori Minagi
    Kazuhiro Takemoto
    BMC Medical Imaging, 21
  • [28] AdvDiff: Generating Unrestricted Adversarial Examples Using Diffusion Models
    Dai, Xuelong
    Liang, Kaisheng
    Xiao, Bin
    COMPUTER VISION-ECCV 2024, PT XLVI, 2025, 15104 : 93 - 109
  • [29] Universal adversarial attacks on deep neural networks for medical image classification
    Hirano, Hokuto
    Minagi, Akinori
    Takemoto, Kazuhiro
    BMC MEDICAL IMAGING, 2021, 21 (01)
  • [30] CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models
    Sun, Zheng
    Zhao, Jinxiao
    Guo, Feng
    Chen, Yuxuan
    Ju, Lei
    CYBERSECURITY, 2024, 7 (01):