Automated Discovery of Adaptive Attacks on Adversarial Defenses

被引:0
|
作者
Yao, Chengyuan [1 ]
Bielik, Pavol [2 ]
Tsankov, Petar [2 ]
Vechev, Martin [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] LatticeFlow, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Reliable evaluation of adversarial defenses is a challenging task, currently limited to an expert who manually crafts attacks that exploit the defenses inner workings or approaches based on an ensemble of fixed attacks, none of which may be effective for the specific defense at hand. Our key observation is that adaptive attacks are composed of reusable building blocks that can be formalized in a search space and used to automatically discover attacks for unknown defenses. We evaluated our approach on 24 adversarial defenses and show that it outperforms AutoAttack (Croce & Hein, 2020b), the current state-of-the-art tool for reliable evaluation of adversarial defenses: our tool discovered significantly stronger attacks by producing 3.0%-50.8% additional adversarial examples for 10 models, while obtaining attacks with slightly stronger or similar strength for the remaining models.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Untargeted, Targeted and Universal Adversarial Attacks and Defenses on Time Series
    Rathore, Pradeep
    Basak, Arghya
    Nistala, Harsha
    Runkana, Venkataramana
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [42] Advances in Adversarial Attacks and Defenses in Intrusion Detection System: A Survey
    Mbow, Mariama
    Sakurai, Kouichi
    Koide, Hiroshi
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 196 - 212
  • [43] Adversarial Attacks and Defenses Against Deep Neural Networks: A Survey
    Ozdag, Mesut
    CYBER PHYSICAL SYSTEMS AND DEEP LEARNING, 2018, 140 : 152 - 161
  • [44] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    NEUROCOMPUTING, 2022, 514 : 162 - 181
  • [45] Automated discovery of mimicry attacks
    Giffin, Jonathon T.
    Jha, Somesh
    Miller, Barton P.
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 41 - 60
  • [46] Automated Crowdturfing Attacks and Defenses in Online Review Systems
    Yao, Yuanshun
    Viswanath, Bimal
    Cryan, Jenna
    Zheng, Haitao
    Zhao, Ben Y.
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1143 - 1158
  • [47] Evaluating the Effectiveness of Attacks and Defenses on Machine Learning Through Adversarial Samples
    Gala, Viraj R.
    Schneider, Martin A.
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, : 90 - 97
  • [48] Kernel-based adversarial attacks and defenses on support vector classification
    Wanman Li
    Xiaozhang Liu
    Anli Yan
    Jie Yang
    Digital Communications and Networks, 2022, 8 (04) : 492 - 497
  • [49] Adversarial attacks and defenses in person search: A systematic mapping study and taxonomy
    Andrade, Eduardo de O.
    Guerin, Joris
    Viterbo, Jose
    Sampaio, Igor Garcia Ballhausen
    IMAGE AND VISION COMPUTING, 2024, 148
  • [50] A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning
    Sadeghi, Koosha
    Banerjee, Ayan
    Gupta, Sandeep K. S.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (04): : 450 - 467