Simple Black-box Adversarial Attacks

被引:0
|
作者
Guo, Chuan [1 ]
Gardner, Jacob R. [2 ]
You, Yurong [1 ]
Wilson, Andrew Gordon [1 ]
Weinberger, Kilian Q. [1 ]
机构
[1] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
[2] Uber AI Labs, San Francisco, CA USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose an intriguingly simple method for the construction of adversarial images in the black-box setting. In constrast to the white-box scenario, constructing black-box adversarial images has the additional constraint on query budget, and efficient attacks remain an open problem to date. With only the mild assumption of continuous-valued confidence scores, our highly query-efficient algorithm utilizes the following simple iterative principle: we randomly sample a vector from a predefined orthonormal basis and either add or subtract it to the target image. Despite its simplicity, the proposed method can be used for both untargeted and targeted attacks - resulting in previously unprecedented query efficiency in both settings. We demonstrate the efficacy and efficiency of our algorithm on several real world settings including the Google Cloud Vision API. We argue that our proposed algorithm should serve as a strong baseline for future blackbox attacks, in particular because it is extremely fast and its implementation requires less than 20 lines of PyTorch code.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
    Dolatabadi, Hadi M.
    Erfani, Sarah
    Leckie, Christopher
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS (NEURIPS 2020), 2020, 33
  • [42] GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
    Fan, Xinxin
    Li, Mengfan
    Zhou, Jia
    Jing, Quanliang
    Lin, Chi
    Lu, Yunfeng
    Bi, Jingping
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2038 - 2048
  • [43] Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition
    Tong, Chuxuan
    Zheng, Xi
    Li, Jianhua
    Ma, Xingjun
    Gao, Longxiang
    Xiang, Yong
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 : 3981 - 3992
  • [44] Black-box adversarial attacks through speech distortion for speech emotion recognition
    Gao, Jinxing
    Yan, Diqun
    Dong, Mingyu
    EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2022, 2022 (01)
  • [45] MalDBA: Detection for Query-Based Malware Black-Box Adversarial Attacks
    Kong, Zixiao
    Xue, Jingfeng
    Liu, Zhenyan
    Wang, Yong
    Han, Weijie
    ELECTRONICS, 2023, 12 (07)
  • [46] Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data
    Shi, Yi
    Sagduyu, Yalin E.
    Davaslioglu, Kemal
    Li, Jason H.
    2018 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2018, : 453 - 458
  • [47] Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
    Suya, Fnu
    Chi, Jianfeng
    Evans, David
    Tian, Yuan
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1327 - 1344
  • [48] PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models
    Wu, Chen
    Zhang, Ruqing
    Guo, Jiafeng
    De Rijke, Maarten
    Fan, Yixing
    Cheng, Xueqi
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 41 (04)
  • [49] Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey
    Alatwi, Huda Ali
    Aldweesh, Amjad
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 34 - 40
  • [50] Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
    Dong, Yinpeng
    Su, Hang
    Wu, Baoyuan
    Li, Zhifeng
    Liu, Wei
    Zhang, Tong
    Zhu, Jun
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 7706 - 7714