Boosting Adversarial Transferability via Gradient Relevance Attack

被引:26
作者
Zhu, Hegui [1 ]
Ren, Yuchen [1 ]
Sui, Xiaoyan [1 ]
Yang, Lianping [1 ]
Jiang, Wuming [2 ]
机构
[1] Northeastern Univ, Coll Sci, Shenyang, Peoples R China
[2] Beijing EyeCool Technol, Beijing, Peoples R China
来源
2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION, ICCV | 2023年
关键词
D O I
10.1109/ICCV51070.2023.00437
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Plentiful adversarial attack researches have revealed the fragility of deep neural networks (DNNs), where the imperceptible perturbations can cause drastic changes in the output. Among the diverse types of attack methods, gradient-based attacks are powerful and easy to implement, arousing wide concern for the security problem of DNNs. However, under the black-box setting, the existing gradient-based attacks have much trouble in breaking through DNN models with defense technologies, especially those adversarially trained models. To make adversarial examples more transferable, in this paper, we explore the fluctuation phenomenon on the plus-minus sign of the adversarial perturbations' pixels during the generation of adversarial examples, and propose an ingenious Gradient Relevance Attack (GRA). Specifically, two gradient relevance frameworks are presented to better utilize the information in the neighborhood of the input, which can correct the update direction adaptively. Then we adjust the update step at each iteration with a decay indicator to counter the fluctuation. Experiment results on a subset of the ILSVRC 2012 validation set forcefully verify the effectiveness of GRA. Furthermore, the attack success rates of 68.7% and 64.8% on Tencent Cloud and Baidu AI Cloud further indicate that GRA can craft adversarial examples with the ability to transfer across both datasets and model architectures. Code is released at https://github.com/RYC-98/GRA.
引用
收藏
页码:4718 / 4727
页数:10
相关论文
共 50 条
[41]   Enhance Domain-Invariant Transferability of Adversarial Examples via Distance Metric Attack [J].
Zhang, Jin ;
Peng, Wenyu ;
Wang, Ruxin ;
Lin, Yu ;
Zhou, Wei ;
Lan, Ge .
MATHEMATICS, 2022, 10 (08)
[42]   Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization [J].
Nowroozi, Ehsan ;
Mohammadi, Mohammadreza ;
Golmohammadi, Pargol ;
Mekdad, Yassine ;
Conti, Mauro ;
Uluagac, Selcuk .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (01) :18-29
[43]   Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors [J].
Liu, Han ;
Huang, Xingshuo ;
Zhang, Xiaotong ;
Li, Qimai ;
Ma, Fenglong ;
Wang, Wei ;
Chen, Hongyang ;
Yu, Hong ;
Zhang, Xianchao .
PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, :1195-1203
[44]   MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack [J].
Hu, Qiang ;
Guo, Yuejun ;
Cordy, Maxime ;
Papadakis, Mike ;
Le Traon, Yves .
2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, :1708-1712
[45]   Enhancing adversarial attack transferability with multi-scale feature attack [J].
Sun, Caixia ;
Zou, Lian ;
Fan, Cien ;
Shi, Yu ;
Liu, Yifeng .
INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2021, 19 (02)
[46]   Meta Gradient Adversarial Attack [J].
Yuan, Zheng ;
Zhang, Jie ;
Jia, Yunpei ;
Tan, Chuanqi ;
Xue, Tao ;
Shan, Shiguang .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :7728-7737
[47]   SGMA: a novel adversarial attack approach with improved transferability [J].
Peican Zhu ;
Jinbang Hong ;
Xingyu Li ;
Keke Tang ;
Zhen Wang .
Complex & Intelligent Systems, 2023, 9 :6051-6063
[48]   Similarity of Neural Architectures Using Adversarial Attack Transferability [J].
Hwang, Jaehui ;
Han, Dongyoon ;
Heo, Byeongho ;
Park, Song ;
Chun, Sanghyuk ;
Lee, Jong-Seok .
COMPUTER VISION - ECCV 2024, PT XXXVII, 2025, 15095 :106-126
[49]   Similarity of Neural Architectures Using Adversarial Attack Transferability [J].
Hwang, Jaehui ;
Han, Dongyoon ;
Heo, Byeongho ;
Park, Song ;
Chun, Sanghyuk ;
Lee, Jong-Seok .
COMPUTER VISION - ECCV 2024, PT LXVIII, 2025, 15126 :106-126
[50]   Enhancing Adversarial Example Transferability with an Intermediate Level Attack [J].
Huang, Qian ;
Katsman, Isay ;
He, Horace ;
Gu, Zeqi ;
Belongie, Serge ;
Lim, Ser-Nam .
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, :4732-4741