Practical Relative Order Attack in Deep Ranking

被引:8
|
作者
Zhou, Mo [1 ]
Wang, Le [1 ]
Niu, Zhenxing [2 ]
Zhang, Qilin [3 ]
Xu, Yinghui [2 ]
Zheng, Nanning [1 ]
Hua, Gang [4 ]
机构
[1] Xi An Jiao Tong Univ, Xian, Peoples R China
[2] Alibaba Grp, Hangzhou, Zhejiang, Peoples R China
[3] HERE Technol, Amsterdam, Netherlands
[4] Wormpex AI Res, Bellevue, WA USA
基金
国家重点研发计划;
关键词
D O I
10.1109/ICCV48922.2021.01610
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent studies unveil the vulnerabilities of deep ranking models, where an imperceptible perturbation can trigger dramatic changes in the ranking result. While previous attempts focus on manipulating absolute ranks of certain candidates, the possibility of adjusting their relative order remains under-explored. In this paper, we formulate a new adversarial attack against deep ranking systems, i.e., the Order Attack, which covertly alters the relative order among a selected set of candidates according to an attacker-specified permutation, with limited interference to other unrelated candidates. Specifically, it is formulated as a triplet-style loss imposing an inequality chain reflecting the specified permutation. However, direct optimization of such white-box objective is infeasible in a real-world attack scenario due to various black-box limitations. To cope with them, we propose a Short-range Ranking Correlation metric as a surrogate objective for black-box Order Attack to approximate the white-box method. The Order Attack is evaluated on the Fashion-MNIST and Stanford-Online-Products datasets under both white-box and black-box threat models. The black-box attack is also successfully implemented on a major e-commerce platform. Comprehensive experimental evaluations demonstrate the effectiveness of the proposed methods, revealing a new type of ranking model vulnerability.
引用
收藏
页码:16393 / 16402
页数:10
相关论文
共 50 条
  • [21] A Practical Attack on KeeLoq
    Wim Aerts
    Eli Biham
    Dieter De Moitié
    Elke De Mulder
    Orr Dunkelman
    Sebastiaan Indesteege
    Nathan Keller
    Bart Preneel
    Guy A. E. Vandenbosch
    Ingrid Verbauwhede
    Journal of Cryptology, 2012, 25 : 136 - 157
  • [22] A Practical Attack on KeeLoq
    Aerts, Wim
    Biham, Eli
    De Moitie, Dieter
    De Mulder, Elke
    Dunkelman, Orr
    Indesteege, Sebastiaan
    Keller, Nathan
    Preneel, Bart
    Vandenbosch, Guy A. E.
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 136 - 157
  • [23] Certified Robustness toWord Substitution Ranking Attack for Neural Ranking Models
    Wu, Chen
    Zhang, Ruqing
    Guo, Jiafeng
    Chen, Wei
    Fan, Yixing
    de Rijke, Maarten
    Cheng, Xueqi
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 2128 - 2137
  • [24] A practical attack on KeeLoq
    Indesteege, Sebastiaan
    Keller, Nathan
    Dunkelman, Otr
    Biham, Eli
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 1 - +
  • [25] Deep Spectral Ranking
    Yildiz, Ilkay
    Dy, Jennifer
    Erdogmus, Deniz
    Ostmo, Susan
    Campbell, J. Peter
    Chiang, Michael F.
    Ioannidis, Stratis
    24TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS (AISTATS), 2021, 130 : 361 - +
  • [26] A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers
    Tan, Kai
    Zhan, Dongyang
    Ye, Lin
    Zhang, Hongli
    Fang, Binxing
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (03) : 708 - 721
  • [27] Font Generation and Keypoint Ranking for Stroke Order of Chinese Characters by Deep Neural Networks
    Li H.-T.
    Jiang M.-X.
    Huang T.-T.
    Chiang C.-K.
    SN Computer Science, 2021, 2 (4)
  • [28] Ranking Attack Graphs with Graph Neural Networks
    Lu, Liang
    Safavi-Naini, Rei
    Hagenbuchner, Markus
    Susilo, Willy
    Horton, Jeffrey
    Yong, Sweah Liang
    Tsoi, Ah Chung
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 345 - +
  • [29] Gradient-Based Adversarial Ranking Attack
    Wu C.
    Zhang R.
    Guo J.
    Fan Y.
    Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2022, 35 (03): : 254 - 261
  • [30] On Attack-Relevant Ranking of Network Features
    Ammar, Adel
    Al-Shalfan, Khaled
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (11) : 229 - 236