Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models

被引:3
作者
Zhang, Shenyi [1 ]
Zheng, Baolin [2 ]
Jiang, Peipei [1 ]
Zhao, Lingchen [1 ]
Shen, Chao [3 ]
Wang, Qian [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
[2] Alibaba Grp, Beijing 100102, Peoples R China
[3] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Key Lab Intelligent Networks & Network Secur, Minist Educ MOE, Xian 710049, Peoples R China
关键词
Perturbation methods; Closed box; Measurement; Optimization; Computational modeling; Glass box; Analytical models; Adversarial example; decision-based attack; imperceptible attack;
D O I
10.1109/TIFS.2024.3359441
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Adversarial examples (AEs) pose significant threats to deep neural networks (DNNs), as they can deceive models into making wrong predictions through craftily-designed perturbations. The emergence of decision-based attacks, which rely solely on the top-1 decision label, further increases risks for real-world black-box models. Currently, the prevailing practice for generating AEs in the decision-based setting involves penalizing adversarial perturbations with the $\ell _{p}$ -norm. However, this approach often overlooks the human perception of adversarial perturbations in real-world scenarios. To tackle this issue, we propose a novel and efficient Imperceptible Decision-based Black-box Attack (IDBA). Our method prioritizes optimizing the perception-related distribution of perturbations, rather than solely focusing on the $\ell _{p}$ -norm. Specifically, IDBA analyzes the perceptual preferences of both models and the human vision system, selectively perturbing components that influence model decisions yet remain imperceptible to human eyes. Extensive experiments demonstrate that IDBA outperforms the state-of-the-art methods in terms of invisibility and query efficiency. Notably, IDBA achieves a high Feature SIMilarity (FSIM) score of 0.92 with only 4,800 queries, while simultaneously reducing the Learned Perceptual Image Patch Similarity (LPIPS) to 0.12, showcasing its ability to remain imperceptible.
引用
收藏
页码:3164 / 3177
页数:14
相关论文
共 58 条
[21]   Identity Mappings in Deep Residual Networks [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
COMPUTER VISION - ECCV 2016, PT IV, 2016, 9908 :630-645
[22]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[23]   Densely Connected Convolutional Networks [J].
Huang, Gao ;
Liu, Zhuang ;
van der Maaten, Laurens ;
Weinberger, Kilian Q. .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :2261-2269
[24]  
Dziugaite GK, 2016, Arxiv, DOI arXiv:1608.00853
[25]  
Krizhevsky G., 2009, LEARNING MULTIPLE LA
[26]  
Li H., 2021, P MACHINE LEARNING R, P3142
[27]   QEBA: Query-Efficient Boundary-Based Blackbox Attack [J].
Li, Huichen ;
Xu, Xiaojun ;
Zhang, Xiaolu ;
Yang, Shuang ;
Li, Bo .
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, :1218-1227
[28]   Finding the Secret of Image Saliency in the Frequency Domain [J].
Li, Jia ;
Duan, Ling-Yu ;
Chen, Xiaowu ;
Huang, Tiejun ;
Tian, Yonghong .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2015, 37 (12) :2428-2440
[29]   Image Quality Assessment Based on Gradient Similarity [J].
Liu, Anmin ;
Lin, Weisi ;
Narwaria, Manish .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (04) :1500-1512
[30]  
Liu X., 2017, ICLR, P1