Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning

被引:0
|
作者
Shen, Meng [1 ]
Li, Changyue [1 ]
Yu, Hao [2 ]
Li, Qi [3 ]
Zhu, Liehuang [1 ]
Xu, Ke [4 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, Changsha 2410073, Peoples R China
[3] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100190, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci, Beijing 100190, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金;
关键词
Adaptation models; Perturbation methods; Optimization; Training; Task analysis; Predictive models; Metalearning; Adversarial attack; black-box attack; decision-based; meta-learning; query efficiency;
D O I
10.1109/TDSC.2023.3289298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Decision-based adversarial attacks pose a severe threat to real-world applications of Deep Neural Networks (DNNs), as attackers are assumed to have no prior knowledge about target model except hard labels of model outputs. Existing decision-based attacks require a large number of queries on the target model for a successful attack. In this article, we propose DEAL, a decision-based query efficient adversarial attack based on adaptive boundary learning. DEAL relies on a local model initialized through meta-learning mechanism to obtain the ability to fit new decision boundaries. We conduct extensive experiments to evaluate the effectiveness of DEAL, which demonstrates that it outperforms 8 state-of-the-art attacks. Specifically for the evaluation on CIFAR-10 dataset, DEAL achieves similar attack success rates with a maximum query reduction of 51% in untargeted attacks and 14% in targeted attacks, respectively.
引用
收藏
页码:1740 / 1753
页数:14
相关论文
共 50 条
  • [21] GenDroid: A query-efficient black-box android adversarial attack framework
    Xu, Guangquan
    Shao, Hongfei
    Cui, Jingyi
    Bai, Hongpeng
    Li, Jiliang
    Bai, Guangdong
    Liu, Shaoying
    Meng, Weizhi
    Zheng, Xi
    COMPUTERS & SECURITY, 2023, 132
  • [22] A low-query black-box adversarial attack based on transferability
    Ding, Kangyi
    Liu, Xiaolei
    Niu, Weina
    Hu, Teng
    Wang, Yanping
    Zhang, Xiaosong
    KNOWLEDGE-BASED SYSTEMS, 2021, 226
  • [23] A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space
    Li, Lyue
    Rezapour, Amir
    Tzeng, Wen-Guey
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [24] Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning
    Mo, Xianbo
    Tan, Shunquan
    Li, Bin
    Huang, Jiwu
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3552 - 3554
  • [25] Adaptive Image Transformations for Transfer-Based Adversarial Attack
    Yuan, Zheng
    Zhang, Jie
    Shan, Shiguang
    COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 1 - 17
  • [26] Similarity attack: An adversarial attack game for image classification based on deep learning
    Tian, Xuejun
    Tian, Xinyuan
    Pan, Bingqin
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (03) : 1467 - 1478
  • [27] Efficient Adversarial Attack Based on Moment Estimation and Lookahead Gradient
    Hong, Dian
    Chen, Deng
    Zhang, Yanduo
    Zhou, Huabing
    Xie, Liang
    Ju, Jianping
    Tang, Jianyin
    ELECTRONICS, 2024, 13 (13)
  • [28] Learning-Based Decentralized Offloading Decision Making in an Adversarial Environment
    Cho, Byungjin
    Xiao, Yu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 11308 - 11323
  • [29] Adversarial Attack for Deep Reinforcement Learning Based Demand Response
    Wan, Zhiqiang
    Li, Hepeng
    Shuai, Hang
    Sun, Yan
    He, Haibo
    2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [30] Efficient Federated Learning via Adaptive Model Pruning for Internet of Vehicles With a Constrained Latency
    Chang, Xing
    Obaidat, Mohammad S.
    Ma, Jingxiao
    Xue, Xiaoping
    Yu, Yantao
    Wu, Xuewen
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2025, 10 (02): : 300 - 316