Automated Discovery of Adaptive Attacks on Adversarial Defenses

被引:0
|
作者
Yao, Chengyuan [1 ]
Bielik, Pavol [2 ]
Tsankov, Petar [2 ]
Vechev, Martin [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] LatticeFlow, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Reliable evaluation of adversarial defenses is a challenging task, currently limited to an expert who manually crafts attacks that exploit the defenses inner workings or approaches based on an ensemble of fixed attacks, none of which may be effective for the specific defense at hand. Our key observation is that adaptive attacks are composed of reusable building blocks that can be formalized in a search space and used to automatically discover attacks for unknown defenses. We evaluated our approach on 24 adversarial defenses and show that it outperforms AutoAttack (Croce & Hein, 2020b), the current state-of-the-art tool for reliable evaluation of adversarial defenses: our tool discovered significantly stronger attacks by producing 3.0%-50.8% additional adversarial examples for 10 models, while obtaining attacks with slightly stronger or similar strength for the remaining models.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
    Chen, Zesheng
    Li, Jack
    Chen, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32645 - 32655
  • [32] Adversarial attacks and defenses in physiological computing:a systematic review
    Dongrui Wu
    Jiaxin Xu
    Weili Fang
    Yi Zhang
    Liuqing Yang
    Xiaodong Xu
    Hanbin Luo
    Xiang Yu
    National Science Open, 2023, 2 (01) : 65 - 93
  • [33] Text Adversarial Attacks and Defenses: Issues, Taxonomy, and Perspectives
    Han, Xu
    Zhang, Ying
    Wang, Wei
    Wang, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    IEEE ACCESS, 2021, 9 : 155161 - 155196
  • [35] Combination Attacks and Defenses on SDN Topology Discovery
    Kong, Dezhang
    Shen, Yi
    Chen, Xiang
    Cheng, Qiumei
    Liu, Hongyan
    Zhang, Dong
    Liu, Xuan
    Chen, Shuangxi
    Wu, Chunming
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (02) : 904 - 919
  • [36] Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
    Li, Deqiang
    Li, Qianmu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3886 - 3900
  • [37] Adversarial attacks and defenses on AI in medical imaging informatics: A survey
    Kaviani, Sara
    Han, Ki Jin
    Sohn, Insoo
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 198
  • [38] Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey
    Li, Jiao
    Liu, Yang
    Chen, Tao
    Xiao, Zhen
    Li, Zhenjiang
    Wang, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5103 - 5115
  • [39] Adversarial attacks and defenses using feature-space stochasticity
    Ukita, Jumpei
    Ohki, Kenichi
    NEURAL NETWORKS, 2023, 167 : 875 - 889
  • [40] Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
    Zhou, Shuai
    Liu, Chi
    Ye, Dayong
    Zhu, Tianqing
    Zhou, Wanlei
    Yu, Philip S.
    ACM COMPUTING SURVEYS, 2023, 55 (08)