Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning

被引:0
|
作者
Shen, Meng [1 ]
Li, Changyue [1 ]
Yu, Hao [2 ]
Li, Qi [3 ]
Zhu, Liehuang [1 ]
Xu, Ke [4 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, Changsha 2410073, Peoples R China
[3] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100190, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci, Beijing 100190, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金;
关键词
Adaptation models; Perturbation methods; Optimization; Training; Task analysis; Predictive models; Metalearning; Adversarial attack; black-box attack; decision-based; meta-learning; query efficiency;
D O I
10.1109/TDSC.2023.3289298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Decision-based adversarial attacks pose a severe threat to real-world applications of Deep Neural Networks (DNNs), as attackers are assumed to have no prior knowledge about target model except hard labels of model outputs. Existing decision-based attacks require a large number of queries on the target model for a successful attack. In this article, we propose DEAL, a decision-based query efficient adversarial attack based on adaptive boundary learning. DEAL relies on a local model initialized through meta-learning mechanism to obtain the ability to fit new decision boundaries. We conduct extensive experiments to evaluate the effectiveness of DEAL, which demonstrates that it outperforms 8 state-of-the-art attacks. Specifically for the evaluation on CIFAR-10 dataset, DEAL achieves similar attack success rates with a maximum query reduction of 51% in untargeted attacks and 14% in targeted attacks, respectively.
引用
收藏
页码:1740 / 1753
页数:14
相关论文
共 50 条
  • [1] Decision-Based Adversarial Attack With Frequency Mixup
    Li, Xiu-Chuan
    Zhang, Xu-Yao
    Yin, Fei
    Liu, Cheng-Lin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1038 - 1052
  • [2] Query-Efficient Decision-Based Black-Box Patch Attack
    Chen, Zhaoyu
    Li, Bo
    Wu, Shuang
    Ding, Shouhong
    Zhang, Wenqiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5522 - 5536
  • [3] QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization
    Zhang, Zhuosheng
    Ahmed, Noor
    Yu, Shucheng
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 783 - 788
  • [4] ROBUST DECISION-BASED BLACK-BOX ADVERSARIAL ATTACK VIA COARSE-TO-FINE RANDOM SEARCH
    Kim, Byeong Cheon
    Yu, Youngjoon
    Ro, Yong Man
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 3048 - 3052
  • [5] QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition
    Kang, Zi
    Zhang, Yumei
    Zhang, Rui
    Jiang, Yanan
    Xia, Hui
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT VIII, 2024, 14432 : 417 - 429
  • [6] Transferable adversarial distribution learning: Query-efficient adversarial attack against large language models
    Dong, Huoyuan
    Dong, Jialiang
    Wan, Shaohua
    Yuan, Shuai
    Guan, Zhitao
    COMPUTERS & SECURITY, 2023, 135
  • [7] Adversarial Attack Generation Based on Meta Learning in Specific Emitter Identification
    Li, Mingfang
    Dou, Zheng
    Jiang, Hang
    Wang, Xingyang
    Zhang, Yabin
    Xiang, Wei
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2025, 14 (02) : 285 - 289
  • [8] Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models
    Zhang, Shenyi
    Zheng, Baolin
    Jiang, Peipei
    Zhao, Lingchen
    Shen, Chao
    Wang, Qian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3164 - 3177
  • [9] QUERY-EFFICIENT ADVERSARIAL ATTACK BASED ON LATIN HYPERCUBE SAMPLING
    Wang, Dan
    Lin, Jiayu
    Wang, Yuan-Gen
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 546 - 550
  • [10] Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks
    Esmaeili, Ashkan
    Edraki, Marzieh
    Rahnavard, Nazanin
    Mian, Ajmal
    Shah, Mubarak
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1561 - 1575