Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning

被引:0
|
作者
Shen, Meng [1 ]
Li, Changyue [1 ]
Yu, Hao [2 ]
Li, Qi [3 ]
Zhu, Liehuang [1 ]
Xu, Ke [4 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, Changsha 2410073, Peoples R China
[3] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100190, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci, Beijing 100190, Peoples R China
基金
国家重点研发计划; 北京市自然科学基金;
关键词
Adaptation models; Perturbation methods; Optimization; Training; Task analysis; Predictive models; Metalearning; Adversarial attack; black-box attack; decision-based; meta-learning; query efficiency;
D O I
10.1109/TDSC.2023.3289298
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Decision-based adversarial attacks pose a severe threat to real-world applications of Deep Neural Networks (DNNs), as attackers are assumed to have no prior knowledge about target model except hard labels of model outputs. Existing decision-based attacks require a large number of queries on the target model for a successful attack. In this article, we propose DEAL, a decision-based query efficient adversarial attack based on adaptive boundary learning. DEAL relies on a local model initialized through meta-learning mechanism to obtain the ability to fit new decision boundaries. We conduct extensive experiments to evaluate the effectiveness of DEAL, which demonstrates that it outperforms 8 state-of-the-art attacks. Specifically for the evaluation on CIFAR-10 dataset, DEAL achieves similar attack success rates with a maximum query reduction of 51% in untargeted attacks and 14% in targeted attacks, respectively.
引用
收藏
页码:1740 / 1753
页数:14
相关论文
共 50 条
  • [31] Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems
    Wang, Shen
    Zhang, Zhaoyang
    Zhu, Guopu
    Zhang, Xinpeng
    Zhou, Yicong
    Huang, Jiwu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 351 - 364
  • [32] Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior
    Dong, Yinpeng
    Cheng, Shuyu
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (12) : 9536 - 9548
  • [33] Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model
    Zhang, Dian
    Dong, Yunwei
    NEURAL NETWORKS, 2023, 167 : 730 - 740
  • [34] Black-Box Decision based Adversarial Attack with Symmetric α-stable Distribution
    Srinivasan, Vignesh
    Kuruoglu, Ercan E.
    Mueller, Klaus-Robert
    Samek, Wojciech
    Nakajima, Shinichi
    2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,
  • [35] ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model
    Fu, Zhongwang
    Cui, Xiaohui
    ENTROPY, 2023, 25 (02)
  • [36] SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
    Guan, Yuting
    He, Junjiang
    Li, Tao
    Zhao, Hui
    Ma, Baoqiang
    FUTURE INTERNET, 2023, 15 (04):
  • [37] Data-Efficient Task Generalization via Probabilistic Model-Based Meta Reinforcement Learning
    Bhardwaj, Arjun
    Rothfuss, Jonas
    Sukhija, Bhavya
    As, Yarden
    Hutter, Marco
    Coros, Stelian
    Krause, Andreas
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (04) : 3918 - 3925
  • [38] Adversarial attack for deep-learning-based fault diagnosis models
    Ge, Yipei
    Wang, Huan
    Liu, Zhiliang
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 757 - 761
  • [39] FLAS: Computation and Communication Efficient Federated Learning via Adaptive Sampling
    Shu, Jiangang
    Zhang, Weizhe
    Zhou, Ying
    Cheng, Zhengtao
    Yang, Laurence T.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2003 - 2014
  • [40] Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
    Nowroozi, Ehsan
    Mohammadi, Mohammadreza
    Golmohammadi, Pargol
    Mekdad, Yassine
    Conti, Mauro
    Uluagac, Selcuk
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (01) : 18 - 29