Practical Relative Order Attack in Deep Ranking

被引:8
|
作者
Zhou, Mo [1 ]
Wang, Le [1 ]
Niu, Zhenxing [2 ]
Zhang, Qilin [3 ]
Xu, Yinghui [2 ]
Zheng, Nanning [1 ]
Hua, Gang [4 ]
机构
[1] Xi An Jiao Tong Univ, Xian, Peoples R China
[2] Alibaba Grp, Hangzhou, Zhejiang, Peoples R China
[3] HERE Technol, Amsterdam, Netherlands
[4] Wormpex AI Res, Bellevue, WA USA
基金
国家重点研发计划;
关键词
D O I
10.1109/ICCV48922.2021.01610
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent studies unveil the vulnerabilities of deep ranking models, where an imperceptible perturbation can trigger dramatic changes in the ranking result. While previous attempts focus on manipulating absolute ranks of certain candidates, the possibility of adjusting their relative order remains under-explored. In this paper, we formulate a new adversarial attack against deep ranking systems, i.e., the Order Attack, which covertly alters the relative order among a selected set of candidates according to an attacker-specified permutation, with limited interference to other unrelated candidates. Specifically, it is formulated as a triplet-style loss imposing an inequality chain reflecting the specified permutation. However, direct optimization of such white-box objective is infeasible in a real-world attack scenario due to various black-box limitations. To cope with them, we propose a Short-range Ranking Correlation metric as a surrogate objective for black-box Order Attack to approximate the white-box method. The Order Attack is evaluated on the Fashion-MNIST and Stanford-Online-Products datasets under both white-box and black-box threat models. The black-box attack is also successfully implemented on a major e-commerce platform. Comprehensive experimental evaluations demonstrate the effectiveness of the proposed methods, revealing a new type of ranking model vulnerability.
引用
收藏
页码:16393 / 16402
页数:10
相关论文
共 50 条
  • [1] Adversarial Attack and Defense in Deep Ranking
    Zhou, Mo
    Wang, Le
    Niu, Zhenxing
    Zhang, Qilin
    Zheng, Nanning
    Hua, Gang
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (08) : 5306 - 5324
  • [2] Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0
    Gadyatskaya, Olga
    Jhawar, Ravi
    Kordy, Piotr
    Lounis, Karim
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    QUANTITATIVE EVALUATION OF SYSTEMS, QEST 2016, 2016, 9826 : 159 - 162
  • [3] ARRA: Absolute-Relative Ranking Attack against Image Retrieval
    Li, Siyuan
    Xu, Xing
    Zhou, Zailei
    Yang, Yang
    Wang, Guoqing
    Shen, Heng Tao
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022,
  • [4] Bringing Order to Network Embedding: A Relative Ranking based Approach
    Wang, Yaojing
    Pan, Guosheng
    Yao, Yuan
    Tong, Hanghang
    Yang, Hongxia
    Xu, Feng
    Lu, Jian
    CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, : 1585 - 1594
  • [5] POSTER: Practical Fault Attack on Deep Neural Networks
    Breier, Jakub
    Hou, Xiaolu
    Jap, Dirmanto
    Ma, Lei
    Bhasin, Shivam
    Liu, Yang
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2204 - 2206
  • [6] Deep Attentive Ranking Networks for Learning to Order Sentences
    Kumar, Pawan
    Brahma, Dhanajit
    Karnick, Harish
    Rai, Piyush
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 8115 - 8122
  • [7] Ranking Attack Graphs
    Mehta, Vaibhav
    Bartzis, Constantinos
    Zhu, Haifeng
    Clarke, Edmund
    Wing, Jeannette
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 127 - 144
  • [8] A Practical Deep Online Ranking System in E-commerce Recommendation
    Yan, Yan
    Liu, Zitao
    Zhao, Meng
    Guo, Wentao
    Yan, Weipeng P.
    Bao, Yongjun
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2018, PT III, 2019, 11053 : 186 - 201
  • [9] Learning an Order Preserving Image Similarity through Deep Ranking
    Gupta, Nitin
    Mujumdar, Shashank
    Samanta, Suranjana
    Mehta, Sameep
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 1115 - 1120
  • [10] Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
    Doriguzzi-Corin, R.
    Millar, S.
    Scott-Hayward, S.
    Martinez-del-Rincon, J.
    Siracusa, D.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 876 - 889