Black-Box Decision based Adversarial Attack with Symmetric α-stable Distribution

被引:0
|
作者
Srinivasan, Vignesh [1 ]
Kuruoglu, Ercan E. [2 ]
Mueller, Klaus-Robert [3 ,4 ,5 ]
Samek, Wojciech [1 ]
Nakajima, Shinichi [3 ,6 ]
机构
[1] Fraunhofer Heinrich Hertz Inst, Machine Learning Grp, Berlin, Germany
[2] Italian Natl Res Council CNR, Inst Informat Sci & Technol, Pisa, Italy
[3] Tech Univ Berlin, Machine Learning Grp, Berlin, Germany
[4] Korea Univ, Dept Brain & Cognit Engn, Seoul 02841, South Korea
[5] Max Planck Inst Informat, D-66123 Saarbrucken, Germany
[6] RIKEN Ctr AIP, Tokyo, Japan
关键词
adversarial attack; alpha-stable distribution; deep neural networks; image classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Developing techniques for adversarial attack and defense is an important research field for establishing reliable machine learning and its applications. Many existing methods employ Gaussian random variables for exploring the data space to find the most adversarial (for attacking) or least adversarial (for defense) point. However, the Gaussian distribution is not necessarily the optimal choice when the exploration is required to follow the complicated structure that most real-world data distributions exhibit. In this paper, we investigate how statistics of random variables affect such random walk exploration. Specifically, we generalize the Boundary Attack, a state-of-the-art black box decision based attacking strategy, and propose the Levy Attack, where the random walk is driven by symmetric alpha-stable random variables. Our experiments on MNIST and CIFAR10 datasets show that the Levy-Attack explores the image data space more efficiently, and significantly improves the performance. Our results also give an insight into the recently found fact in the whitebox attacking scenario that the choice of the norm for measuring the amplitude of the adversarial patterns is essential.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors
    Liu, Han
    Huang, Xingshuo
    Zhang, Xiaotong
    Li, Qimai
    Ma, Fenglong
    Wang, Wei
    Chen, Hongyang
    Yu, Hong
    Zhang, Xianchao
    [J]. PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, : 1195 - 1203
  • [2] SIMULATOR ATTACK plus FOR BLACK-BOX ADVERSARIAL ATTACK
    Ji, Yimu
    Ding, Jianyu
    Chen, Zhiyu
    Wu, Fei
    Zhang, Chi
    Sun, Yiming
    Sun, Jing
    Liu, Shangdong
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 636 - 640
  • [3] Amora: Black-box Adversarial Morphing Attack
    Wang, Run
    Juefei-Xu, Felix
    Guo, Qing
    Huang, Yihao
    Xie, Xiaofei
    Ma, Lei
    Liu, Yang
    [J]. MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 1376 - 1385
  • [4] Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
    Feng, Yan
    Wu, Baoyuan
    Fan, Yanbo
    Liu, Li
    Li, Zhifeng
    Xia, Shu-Tao
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15074 - 15083
  • [5] A black-Box adversarial attack for poisoning clustering
    Cina, Antonio Emanuele
    Torcinovich, Alessandro
    Pelillo, Marcello
    [J]. PATTERN RECOGNITION, 2022, 122
  • [6] Adversarial Eigen Attack on Black-Box Models
    Zhou, Linjun
    Cui, Peng
    Zhang, Xingxuan
    Jiang, Yinan
    Yang, Shiqiang
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15233 - 15241
  • [7] Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
    Dai, Zeyu
    Liu, Shengcai
    Li, Qing
    Tang, Ke
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (03)
  • [8] A low-query black-box adversarial attack based on transferability
    Ding, Kangyi
    Liu, Xiaolei
    Niu, Weina
    Hu, Teng
    Wang, Yanping
    Zhang, Xiaosong
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 226
  • [9] An adversarial attack on DNN-based black-box object detectors
    Wang, Yajie
    Tan, Yu-an
    Zhang, Wenjiao
    Zhao, Yuhang
    Kuang, Xiaohui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161
  • [10] Boosting Black-box Adversarial Attack with a Better Convergence
    Yin, Heng
    Wang, Jindong
    Mi, Yan
    Zhang, Xiaoning
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1234 - 1238