Improved black-box attack based on query and perturbation distribution

被引:2
|
作者
Zhao, Weiwei [1 ]
Zeng, Zhigang [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Artificial Intelligence & Automat, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
adversarial examples; deep neural network; black-box attack; decision-based attack;
D O I
10.1109/ICACI52617.2021.9435907
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial examples cause the deep neural network prediction error, which is a great threat to the deep neural network. How to generate more natural adversarial examples and improve the robustness of deep neural networks has received attention. In this paper, we propose an improved black-box attack (IBBA) algorithm based on query and perturbation distribution. This algorithm only needs the top-1 label of the attacked model to generate the adversarial examples. Based on the existing black-box attacks, we optimize the performance of the algorithm from two aspects: query distribution and perturbation distribution. In the aspect of query distribution, we adopt different strategies for nontargeted attack and targeted attack; in the aspect of perturbation distribution, we choose different low-frequency noise according to the difference between the targeted attack and nontargeted attack. The experimental results on ImageNet show that the proposed algorithm is better than the existing algorithms in low query number, and the targeted attack is better in each specified query number.
引用
收藏
页码:117 / 125
页数:9
相关论文
共 50 条
  • [1] Black-Box Based Limited Query Membership Inference Attack
    Zhang, Yu
    Zhou, Huaping
    Wang, Pengyan
    Yang, Gaoming
    [J]. IEEE ACCESS, 2022, 10 : 55459 - 55468
  • [2] A low-query black-box adversarial attack based on transferability
    Ding, Kangyi
    Liu, Xiaolei
    Niu, Weina
    Hu, Teng
    Wang, Yanping
    Zhang, Xiaosong
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 226
  • [3] Query-Efficient Decision-Based Black-Box Patch Attack
    Chen, Zhaoyu
    Li, Bo
    Wu, Shuang
    Ding, Shouhong
    Zhang, Wenqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5522 - 5536
  • [4] Query-Efficient Black-Box Attack by Active Learning
    Li, Pengcheng
    Yi, Jinfeng
    Zhang, Lijun
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 1200 - 1205
  • [5] Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
    Liang, Siyuan
    Wu, Baoyuan
    Fan, Yanbo
    Wei, Xingxing
    Cao, Xiaochun
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 7677 - 7687
  • [6] Query-based black-box attack against medical image segmentation model
    Li, Siyuan
    Huang, Guangji
    Xu, Xing
    Lu, Huimin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 133 : 331 - 337
  • [7] Query efficient black-box adversarial attack on deep neural networks
    Bai, Yang
    Wang, Yisen
    Zeng, Yuyuan
    Jiang, Yong
    Xia, Shu-Tao
    [J]. PATTERN RECOGNITION, 2023, 133
  • [8] Black-Box Decision based Adversarial Attack with Symmetric α-stable Distribution
    Srinivasan, Vignesh
    Kuruoglu, Ercan E.
    Mueller, Klaus-Robert
    Samek, Wojciech
    Nakajima, Shinichi
    [J]. 2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,
  • [9] Query-Efficient Target-Agnostic Black-Box Attack
    Moraffah, Raha
    Liu, Huan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 368 - 377
  • [10] TOWARDS QUERY EFFICIENT AND GENERALIZABLE BLACK-BOX FACE RECONSTRUCTION ATTACK
    Park, Hojin
    Park, Jaewoo
    Dong, Xingbo
    Teoh, Andrew Beng Jin
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2023, : 1060 - 1064