Fast Gradient Scaled Method for Generating Adversarial Examples

被引:0
|
作者
Xu, Zhefeng [1 ]
Luo, Zhijian [1 ]
Mu, Jinlong [1 ]
机构
[1] Hunan Inst Traff Engn, Hengyang, Hunan, Peoples R China
关键词
adversarial examples; FGSM; FGScaledM; adversarial perturbations;
D O I
10.1145/3529466.3529497
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Though deep neural networks have achieved great success on many challenging tasks, they are demonstrated to be vulnerable to adversarial examples, which fool neural networks by adding human-imperceptible perturbations to the clean examples. As the first generation attack for generating adversarial examples, FGSM has inspired many follow-up attacks. However, the adversarial perturbations generated by FGSM are usually human-perceptible because FGSM modifies the pixels by the same amplitude through computing the sign of the gradients of the loss. To this end, we propose the fast gradient scaled method (FGScaledM), which scales the gradients of the loss to the valid range and can make adversarial perturbation to be more human-imperceptible. Extensive experiments on MNIST and CIFAR-10 datasets show that while maintaining similar attack success rates, our proposed FGScaledM can generate more fine-grained and more human-imperceptible adversarial perturbations than FGSM.
引用
下载
收藏
页码:189 / 193
页数:5
相关论文
共 50 条
  • [31] On the Strengths of Pure Evolutionary Algorithms in Generating Adversarial Examples
    Bartlett, Antony
    Liem, Cynthia C. S.
    Panichella, Annibale
    2023 IEEE/ACM INTERNATIONAL WORKSHOP ON SEARCH-BASED AND FUZZ TESTING, SBFT, 2023, : 1 - 8
  • [32] Generating Fluent Chinese Adversarial Examples for Sentiment Classification
    Wang, Congyi
    Zeng, Jianping
    Wu, Chengrong
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2020, : 149 - +
  • [33] Generating Transferable Adversarial Examples against Vision Transformers
    Wang, Yuxuan
    Wang, Jiakai
    Yin, Zinxin
    Gong, Ruihao
    Wang, Jingyi
    Liu, Aishan
    Liu, Xianglong
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 5181 - 5190
  • [34] Generating unrestricted adversarial examples via three parameteres
    Hanieh Naderi
    Leili Goli
    Shohreh Kasaei
    Multimedia Tools and Applications, 2022, 81 : 21919 - 21938
  • [35] Generating unrestricted adversarial examples via three parameteres
    Naderi, Hanieh
    Goli, Leili
    Kasaei, Shohreh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (15) : 21919 - 21938
  • [36] Marginal Attacks of Generating Adversarial Examples for Spam Filtering
    Zhaoquan, Gu
    Yushun, Xie
    Weixiong, Hu
    Lihua, Yin
    Yi, Han
    Zhihong, Tian
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 595 - 602
  • [37] Generating Adversarial Examples with Image-To-Perturbation Network
    Wang, Desheng
    Jin, Weidong
    Wu, Yunpu
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7055 - 7060
  • [38] Common knowledge learning for generating transferable adversarial examples
    Ruijie Yang
    Yuanfang Guo
    Junfu Wang
    Jiantao Zhou
    Yunhong Wang
    Frontiers of Computer Science, 2025, 19 (10)
  • [39] GENERATING ADVERSARIAL EXAMPLES BY MAKEUP ATTACKS ON FACE RECOGNITION
    Zhu, Zheng-An
    Lu, Yun-Zhong
    Chiang, Chen-Kuo
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 2516 - 2520
  • [40] AdvCGAN: An Elastic and Covert Adversarial Examples Generating Framework
    Wang, Baoli
    Fan, Xinxin
    Jing, Quanliang
    Tan, Haining
    Bi, Jingping
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,