Query Complexity of Adversarial Attacks

被引:0
|
作者
Gluch, Grzegorz [1 ]
Urbanke, Ruediger [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There are two main attack models considered in the adversarial robustness literature: black-box and white-box. We consider these threat models as two ends of a fine-grained spectrum, indexed by the number of queries the adversary can ask. Using this point of view we investigate how many queries the adversary needs to make to design an attack that is comparable to the best possible attack in the white-box model. We give a lower bound on that number of queries in terms of entropy of decision boundaries of the classifier. Using this result we analyze two classical learning algorithms on two synthetic tasks for which we prove meaningful security guarantees. The obtained bounds suggest that some learning algorithms are inherently more robust against query-bounded adversaries than others.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] The Query-Complexity of Preprocessing Attacks
    Ghoshal, Ashrujit
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT II, 2023, 14082 : 482 - 513
  • [2] Query-based Local Black-box Adversarial Attacks
    Shi, Jing
    Zhang, Xiaolin
    Xu, Enhui
    Wang, Yongping
    Zhang, Wenwen
    International Journal of Network Security, 2023, 25 (06) : 1048 - 1058
  • [3] Towards Query-limited Adversarial Attacks on Graph Neural Networks
    Li, Haoran
    Zhang, Jinhong
    Gao, Song
    Wu, Liwen
    Zhou, Wei
    Wang, Ruxin
    2022 IEEE 34TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, 2022, : 516 - 521
  • [4] SAM: Query-efficient Adversarial Attacks against Graph Neural Networks
    Zhang, Chenhan
    Zhang, Shiyao
    Yu, James J. Q.
    Yu, Shui
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (04)
  • [5] SURGEPROTECTOR: Mitigating Temporal Algorithmic Complexity Attacks using Adversarial Scheduling
    Atre, Nirav
    Sadok, Hugo
    Chiang, Erica
    Wang, Weina
    Sherry, Justine
    SIGCOMM '22: PROCEEDINGS OF THE 2022 ACM SIGCOMM 2022 CONFERENCE, 2022, : 723 - 738
  • [6] Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition
    Tong, Chuxuan
    Zheng, Xi
    Li, Jianhua
    Ma, Xingjun
    Gao, Longxiang
    Xiang, Yong
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 : 3981 - 3992
  • [7] AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems
    Ge, Yunjie
    Zhao, Lingchen
    Wang, Qian
    Duan, Yiheng
    Du, Minxin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3647 - 3661
  • [8] MalDBA: Detection for Query-Based Malware Black-Box Adversarial Attacks
    Kong, Zixiao
    Xue, Jingfeng
    Liu, Zhenyan
    Wang, Yong
    Han, Weijie
    ELECTRONICS, 2023, 12 (07)
  • [9] Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems
    Wang, Qian
    Zheng, Baolin
    Li, Qi
    Shen, Chao
    Ba, Zhongjie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 896 - 908
  • [10] ADVERSARIAL ATTACKS ON ADVERSARIAL BANDITS
    Microsoft Azure AI
    不详
    arXiv, 1600,