Sample Based Fast Adversarial Attack Method

被引:0
|
作者
Zhi-Ming Wang
Meng-Ting Gu
Jia-Hui Hou
机构
[1] University of Science and Technology Beijing,School of Computer and Communication Engineering
来源
Neural Processing Letters | 2019年 / 50卷
关键词
Deep learning; Deep neural network; Adversarial sample; Principle component analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Deep neural network (DNN) brings the rapid development of pattern recognition algorithms. However, a large number of experiments show that there are some vulnerabilities in DNNs. Though many adversarial samples generating algorithms has been proposed, most of them based on some known information of attacked model. We proposed a new fast black-box adversarial attack algorithm purely based on data samples. First, we find the key difference between different classes based on principle component analysis and calculate the difference vector. During attacking, we just drive a sample to the target class (for target adversarial) or the nearest other class (for misclassification adversarial). The minimum modification to create an target adversarial sample is obtained by bi-section line search along the difference vector from current class to target class. For misclassification adversarial attack, the minimum modification among all other classes is given. Experimental results show that the proposed algorithm generating comparable adversarial samples much fast then classical attack algorithms.
引用
收藏
页码:2731 / 2744
页数:13
相关论文
共 50 条
  • [1] Sample Based Fast Adversarial Attack Method
    Wang, Zhi-Ming
    Gu, Meng-Ting
    Hou, Jia-Hui
    [J]. NEURAL PROCESSING LETTERS, 2019, 50 (03) : 2731 - 2744
  • [2] A Fast and Efficient Adversarial Attack Based on Feasible Direction Method
    Sun, Jiyuan
    Yu, Haibo
    [J]. IEEE ACCESS, 2024, 12 : 82261 - 82276
  • [3] Electromagnetic signal fast adversarial attack method based on Jacobian saliency map
    Zhang, Jian
    Zhou, Xia
    Zhang, Yiran
    Wang, Zicong
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (01): : 180 - 193
  • [4] Adversarial Sample Attack and Defense Method for Encrypted Traffic Data
    Ding, Yi
    Zhu, Guiqin
    Chen, Dajiang
    Qin, Xue
    Cao, Mingsheng
    Qin, Zhiguang
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 18024 - 18039
  • [5] A variable adversarial attack method based on filtering
    Li, Jiachun
    Hu, Yuchao
    Xia, Fei
    [J]. COMPUTERS & SECURITY, 2023, 134
  • [6] Adversarial attack method based on loss smoothing
    Li, Meihong
    Jin, Shuang
    Du, Ye
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (02): : 663 - 670
  • [7] Sample-analysis based adversarial attack with saliency map
    Zhang, Dian
    Dong, Yunwei
    Yang, Yun
    [J]. APPLIED SOFT COMPUTING, 2024, 161
  • [8] A method for filtering the attack pairs of adversarial examples based on attack distance
    Liu, Hongyi
    Fang, Yutong
    Wen, Weiping
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 339 - 347
  • [9] FAWA: Fast Adversarial Watermark Attack
    Jiang, Hao
    Yang, Jintao
    Hua, Guang
    Li, Lixia
    Wang, Ying
    Tu, Shenghui
    Xia, Song
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (02) : 301 - 313
  • [10] An Universal Adversarial Attack Method Based on Spherical Projection
    Fan, Chunlong
    Zhang, Zhimin
    Qiao, Jianzhong
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (02)