Query-efficient decision-based attack via sampling distribution reshaping

被引:15
|
作者
Sun, Xuxiang [1 ]
Cheng, Gong [1 ]
Pei, Lei [1 ]
Han, Junwei [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian 710072, Peoples R China
基金
美国国家科学基金会;
关键词
Adversarial examples; Decision-based attack; Image classification; Normal vector estimation; Distribution reshaping; ROBUSTNESS; NETWORKS;
D O I
10.1016/j.patcog.2022.108728
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With a limited query budget and only the final decision of a target model, how to find adversarial examples with low-magnitude distortion has attracted great attention among researchers. Recent solutions to this issue made use of the estimated normal vector at a boundary data point to search for adversarial examples. However, since the sampling independence between two sampling epochs, they still suffer from a prohibitively high query budget, which will get worse when the dimensionality of the attacked samples get increased. To push for further development, in this paper, we pay attention to a query-efficient method to estimate the normal vector for decision-based attack in high-dimensional space. Specifically, we propose a simple yet effective normal vector estimation framework for high-dimension decision-based attack via Sampling Distribution Reshaping, dubbed SDR. Next, SDR is incorporated into general geometric attack framework. Briefly, SDR leverages all the historically sampled noise to build a guiding vector, which will be used to reshape the next sampling distribution. Besides, we also extend SDR to different l(p) norms for p = {2, infinity} col and deploy low-frequency constraint to enhance the performance of SDR. Compared to peer decision-based attacks, SDR can reach the competitive l(p) norms for p = {2, infinity}, according to extensive experimental evaluations against both defended and undefended classifiers. Since the simplicity and effectiveness of SDR, we think that reshaping the sampling distribution deserves further research in future works. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
    Chen, Jianbo
    Jordan, Michael, I
    Wainwright, Martin J.
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1277 - 1294
  • [2] Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack
    Wang, Xiaosen
    Zhang, Zeliang
    Tong, Kangheng
    Gong, Dihong
    He, Kun
    Li, Zhifeng
    Liu, Andwei
    [J]. COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 156 - 174
  • [3] DAIR: A Query-Efficient Decision-based Attack on Image Retrieval Systems
    Chen, Mingyang
    Lu, Junda
    Wang, Yi
    Qin, Jianbin
    Wang, Wei
    [J]. SIGIR '21 - PROCEEDINGS OF THE 44TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2021, : 1064 - 1073
  • [4] Query-Efficient Decision-Based Black-Box Patch Attack
    Chen, Zhaoyu
    Li, Bo
    Wu, Shuang
    Ding, Shouhong
    Zhang, Wenqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5522 - 5536
  • [5] QUERY-EFFICIENT ADVERSARIAL ATTACK BASED ON LATIN HYPERCUBE SAMPLING
    Wang, Dan
    Lin, Jiayu
    Wang, Yuan-Gen
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 546 - 550
  • [6] Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning
    Shen, Meng
    Li, Changyue
    Yu, Hao
    Li, Qi
    Zhu, Liehuang
    Xu, Ke
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1740 - 1753
  • [7] QEBA: Query-Efficient Boundary-Based Blackbox Attack
    Li, Huichen
    Xu, Xiaojun
    Zhang, Xiaolu
    Yang, Shuang
    Li, Bo
    [J]. 2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 1218 - 1227
  • [8] Query-Efficient Black-Box Adversarial Attack With Customized Iteration and Sampling
    Shi, Yucheng
    Han, Yahong
    Hu, Qinghua
    Yang, Yi
    Tian, Qi
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 2226 - 2245
  • [9] QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition
    Kang, Zi
    Zhang, Yumei
    Zhang, Rui
    Jiang, Yanan
    Xia, Hui
    [J]. PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT VIII, 2024, 14432 : 417 - 429
  • [10] DeepRover: A Query-Efficient Blackbox Attack for Deep Neural Networks
    Zhang, Fuyuan
    Hu, Xinwen
    Ma, Lei
    Zhao, Jianjun
    [J]. PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1384 - 1394