Practical Relative Order Attack in Deep Ranking

被引:8
|
作者
Zhou, Mo [1 ]
Wang, Le [1 ]
Niu, Zhenxing [2 ]
Zhang, Qilin [3 ]
Xu, Yinghui [2 ]
Zheng, Nanning [1 ]
Hua, Gang [4 ]
机构
[1] Xi An Jiao Tong Univ, Xian, Peoples R China
[2] Alibaba Grp, Hangzhou, Zhejiang, Peoples R China
[3] HERE Technol, Amsterdam, Netherlands
[4] Wormpex AI Res, Bellevue, WA USA
基金
国家重点研发计划;
关键词
D O I
10.1109/ICCV48922.2021.01610
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent studies unveil the vulnerabilities of deep ranking models, where an imperceptible perturbation can trigger dramatic changes in the ranking result. While previous attempts focus on manipulating absolute ranks of certain candidates, the possibility of adjusting their relative order remains under-explored. In this paper, we formulate a new adversarial attack against deep ranking systems, i.e., the Order Attack, which covertly alters the relative order among a selected set of candidates according to an attacker-specified permutation, with limited interference to other unrelated candidates. Specifically, it is formulated as a triplet-style loss imposing an inequality chain reflecting the specified permutation. However, direct optimization of such white-box objective is infeasible in a real-world attack scenario due to various black-box limitations. To cope with them, we propose a Short-range Ranking Correlation metric as a surrogate objective for black-box Order Attack to approximate the white-box method. The Order Attack is evaluated on the Fashion-MNIST and Stanford-Online-Products datasets under both white-box and black-box threat models. The black-box attack is also successfully implemented on a major e-commerce platform. Comprehensive experimental evaluations demonstrate the effectiveness of the proposed methods, revealing a new type of ranking model vulnerability.
引用
收藏
页码:16393 / 16402
页数:10
相关论文
共 50 条
  • [31] To attack or not attack? The role of relative status, awareness, and motivation
    Channagiri, Tejaswi
    Ferrier, Walter J.
    Reger, Rhonda K.
    LONG RANGE PLANNING, 2024, 57 (06)
  • [32] The conditional correlation attack: A practical attack on bluetooth encryption
    Lu, Y
    Meier, W
    Vaudenay, S
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 97 - 117
  • [33] RANKING ALTERNATIVES BY THE METHOD OF RELATIVE SIGNIFICANCES
    HROUDA, J
    EKONOMICKO-MATEMATICKY OBZOR, 1983, 19 (04): : 361 - 375
  • [34] THE HAZARD RANKING SYSTEM AND RELATIVE RISK
    JOHNSON, RC
    ZARAGOZA, LJ
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1991, 202 : 79 - ENVR
  • [35] Relative Depth Estimation as a Ranking Problem
    Mertan, Alican
    Duff, Damien Jade
    Unal, Gozde
    2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [36] A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
    Bloemer, Johannes
    da Silva, Ricardo Gomes
    Guenther, Peter
    Kraemer, Juliane
    Seifert, Jean-Pierre
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 123 - 136
  • [37] A practical implementation of the timing attack
    Dhem, JF
    Koeune, F
    Leroux, PA
    Mestré, P
    Quisquater, JJ
    Willems, JL
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 167 - 182
  • [38] A practical attack on the MIFARE Classic
    Gans, Gerhard de Koning
    Hoepman, Jaap-Henk
    Garcia, Flavio D.
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 267 - 282
  • [39] Practical Algebraic Attack on DAGS
    Bardet, Magali
    Bertin, Manon
    Couvreur, Alain
    Otmani, Ayoub
    CODE-BASED CRYPTOGRAPHY, CBC 2019, 2019, 11666 : 86 - 101
  • [40] Practical attack on the shrinking generator
    Caballero-Gil, Pino
    Fuster-Sabater, Amparo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 1035 - 1043