TSadv: Black-box adversarial attack on time series with local perturbations

被引:8
|
作者
Yang, Wenbo [1 ,2 ]
Yuan, Jidong [1 ,2 ]
Wang, Xiaokang [3 ]
Zhao, Peixiang [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Beijing Key Lab Traff Data Anal & Min, Beijing 100044, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Econ & Management, Beijing 100876, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金;
关键词
Black-box adversarial attack; Time series classification; Local perturbations; Differential evolution; Shapelet; DIFFERENTIAL EVOLUTION;
D O I
10.1016/j.engappai.2022.105218
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks (DNNs) for time series classification have potential security concerns due to their vulnerability to adversarial attacks. Previous work that perturbs time series globally requires gradient information to generate adversarial examples, leading to being perceived easily. In this paper, we propose a gradient-free black-box method called TSadv to attack DNNs with local perturbations. First, we formalize the attack as a constrained optimization problem solved by a differential evolution algorithm without any inner information of the target model. Second, with the assumption that time series shapelets provide more discriminative information between different classes, the range of perturbations is designed based on their intervals. Experimental results show that our method can effectively attack DNNs on time series datasets that have potential security concerns and generate imperceptible adversarial samples flexibly. Besides, our approach decreases the mean squared error by approximately two orders of magnitude compared with the state-of-the-art method while retaining competitive attacking success rates.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] TSadv: Black-box adversarial attack on time series with local perturbations
    Yang, Wenbo
    Yuan, Jidong
    Wang, Xiaokang
    Zhao, Peixiang
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 114
  • [2] Black-Box Adversarial Attack on Time Series Classification
    Ding, Daizong
    Zhang, Mi
    Feng, Fuli
    Huang, Yuanmin
    Jiang, Erling
    Yang, Min
    [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 6, 2023, : 7358 - 7368
  • [3] Data-Free Adversarial Perturbations for Practical Black-Box Attack
    Huan, Zhaoxin
    Wang, Yulong
    Zhang, Xiaolu
    Shang, Lin
    Fu, Chilin
    Zhou, Jun
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2020, PT II, 2020, 12085 : 127 - 138
  • [4] SIMULATOR ATTACK plus FOR BLACK-BOX ADVERSARIAL ATTACK
    Ji, Yimu
    Ding, Jianyu
    Chen, Zhiyu
    Wu, Fei
    Zhang, Chi
    Sun, Yiming
    Sun, Jing
    Liu, Shangdong
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 636 - 640
  • [5] Amora: Black-box Adversarial Morphing Attack
    Wang, Run
    Juefei-Xu, Felix
    Guo, Qing
    Huang, Yihao
    Xie, Xiaofei
    Ma, Lei
    Liu, Yang
    [J]. MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 1376 - 1385
  • [6] Exploiting the Local Parabolic Landscapes of Adversarial Losses to Accelerate Black-Box Adversarial Attack
    Tran, Hoang
    Lu, Dan
    Zhang, Guannan
    [J]. COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 317 - 334
  • [7] A black-Box adversarial attack for poisoning clustering
    Cina, Antonio Emanuele
    Torcinovich, Alessandro
    Pelillo, Marcello
    [J]. PATTERN RECOGNITION, 2022, 122
  • [8] Adversarial Eigen Attack on Black-Box Models
    Zhou, Linjun
    Cui, Peng
    Zhang, Xingxuan
    Jiang, Yinan
    Yang, Shiqiang
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15233 - 15241
  • [9] Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
    Dai, Zeyu
    Liu, Shengcai
    Li, Qing
    Tang, Ke
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (03)
  • [10] Adversarial Attack of Time Series Forecasting Based on Local Perturbations
    Zhang, Yao-Yuan
    Yuan, Ji-Dong
    Liu, Hai-Yang
    Wang, Zhi-Hai
    Zhao, Pei-Xiang
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5210 - 5227