Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding

被引:0
作者
Zhou H. [1 ]
Wang Y. [2 ]
Tan Y.-A. [2 ]
Wu S. [2 ]
Zhao Y. [2 ]
Zhang Q. [1 ]
Li Y. [1 ]
机构
[1] Beijing Institute of Technology, School of Computer Science and Technology, Beijing
[2] Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing
来源
IEEE Transactions on Artificial Intelligence | 2024年 / 5卷 / 01期
关键词
Adversarial example; black-box attack; face recognition (FR); transfer attack; transferability;
D O I
10.1109/TAI.2023.3253083
中图分类号
学科分类号
摘要
In recent years, deep neural networks (DNNs) have made significant progress on face recognition (FR). However, DNNs have been found to be vulnerable to adversarial examples, leading to fatal consequences in real-world applications. This article focuses on improving the transferability of adversarial examples against FR models. We propose gradient eroding (GE) to make the gradient of the residual blocks more diverse, by eroding the back-propagation dynamically. We also propose a novel black-box adversarial attack named corrasion attack based on GE. Extensive experiments demonstrate that our approach can effectively improve the transferability of adversarial attacks against FR models. Our approach overperforms 29.35% in fooling rate than state-of-the-art black-box attacks. Leveraging adversarial training with adversarial examples generated by us, the robustness of models can be improved by up to 43.2%. Besides, corrasion attack successfully breaks two online FR systems, achieving a highest fooling rate of 89.8%. © 2020 IEEE.
引用
收藏
页码:412 / 419
页数:7
相关论文
共 15 条
  • [1] TransMix: Crafting highly transferable adversarial examples to evade face recognition models
    Khedr, Yasmeen M.
    Liu, Xin
    He, Kun
    IMAGE AND VISION COMPUTING, 2024, 146
  • [2] Towards Transferable Adversarial Attack Against Deep Face Recognition
    Zhong, Yaoyao
    Deng, Weihong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1452 - 1466
  • [3] GNP ATTACK: TRANSFERABLE ADVERSARIAL EXAMPLES VIA GRADIENT NORM PENALTY
    Wu, Tao
    Luo, Tie
    Wunsch, Donald C.
    2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2023, : 3110 - 3114
  • [4] Toward Transferable Attack via Adversarial Diffusion in Face Recognition
    Hu, Cong
    Li, Yuanbo
    Feng, Zhenhua
    Wu, Xiaojun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5506 - 5519
  • [5] Hierarchical feature transformation attack: Generate transferable adversarial examples for face recognition
    Li, Yuanbo
    Hu, Cong
    Wang, Rui
    Wu, Xiaojun
    APPLIED SOFT COMPUTING, 2025, 172
  • [6] ANF: Crafting Transferable Adversarial Point Clouds via Adversarial Noise Factorization
    Chen, Hai
    Zhao, Shu
    Yang, Xiao
    Yan, Huanqian
    He, Yuan
    Xue, Hui
    Qian, Fulan
    Su, Hang
    IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (02) : 835 - 847
  • [7] Generating Transferable Adversarial Examples against Vision Transformers
    Wang, Yuxuan
    Wang, Jiakai
    Yin, Zinxin
    Gong, Ruihao
    Wang, Jingyi
    Liu, Aishan
    Liu, Xianglong
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 5181 - 5190
  • [8] CSA: Crafting adversarial examples via content and style attacks
    Chen, Wei
    Zhang, Yunqi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [9] Transferable adversarial attacks against face recognition using surrogate model fine-tuning
    Khedr, Yasmeen M.
    Liu, Xin
    Lu, Haobo
    He, Kun
    APPLIED SOFT COMPUTING, 2025, 174
  • [10] Crafting imperceptible and transferable adversarial examples: leveraging conditional residual generator and wavelet transforms to deceive deepfake detection
    Li, Zhiyuan
    Jin, Xin
    Jiang, Qian
    Wang, Puming
    Lee, Shin-Jye
    Yao, Shaowen
    Zhou, Wei
    VISUAL COMPUTER, 2024, : 3329 - 3344