Black-box Adversarial Attack Method Based on Evolution Strategy and Attention Mechanism

被引:0
作者
Huang L.-F. [1 ,2 ]
Zhuang W.-Z. [1 ]
Liao Y.-X. [1 ]
Liu N. [1 ,2 ]
机构
[1] School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou
[2] Guangdong Key Laboratory of Information Security Technology, Guangzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2021年 / 32卷 / 11期
基金
中国国家自然科学基金;
关键词
Adversarial example; Attention mechanism; Black-box attack; Evolution strategy; Optimization of compression;
D O I
10.13328/j.cnki.jos.006084
中图分类号
学科分类号
摘要
Since deep neural networks (DNNs) have provided state-of-the-art results for different computer vision tasks, they are utilized as the basic backbones to be employed in many domains. Nevertheless, DNNs have been demonstrated to be vulnerable to adversarial attacks in recent researches, which will threaten the security of different DNN-based systems. Compared with white-box adversarial attacks, black-box attacks are more similar to the realistic scenarios under the constraints like lacking knowledge of model and limited queries. However, existing methods under black-box scenarios not only require a large amount of model queries, but also are perceptible from human vision system. To address these issues, this study proposes a novel method based on evolution strategy, which improves the attack performance by considering the inherent distribution of updated gradient direction. It helps the proposed method in sampling effective solutions with higher probabilities as well as learning better searching paths. In order to make generated adversarial example less perceptible and reduce the redundant perturbations after a successful attacking, the proposed method utilizes class activation mapping to group the perturbations by introducing the attention mechanism, and then compresses the noise group by group while ensure that the generated images can still fool the target model. Extensive experiments on seven DNNs with different structures suggest the superiority of the proposed method compared with the state-of-the-art black-box adversarial attack approaches (i.e., AutoZOOM, QL-attack, FD-attack, and D-based attack). © Copyright 2021, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3512 / 3529
页数:17
相关论文
共 44 条
  • [1] Niu L, Veeraraghavan A, Sabharwal A., Webly supervised learning meets zero-shot learning: A hybrid approach for fine-grained classification, Proc. of the Conf. on Computer Vision and Pattern Recognition, pp. 7171-7180, (2018)
  • [2] Huang JP, Shi YH, Gao Y., Multi-scale Faster-RCNN algorithm for small object detection, Journal of Computer Research and Development, 56, 2, pp. 319-327, (2019)
  • [3] Huang L, Yang Y, Wang QJ, Guo F, Gao Y., Indoor scene segmentation based on fully convolutional neural networks, Journal of Image and Graphics, 24, 1, pp. 64-72, (2019)
  • [4] Long J, Shelhamer E, Darrell T., Fully convolutional networks for semantic segmentation, IEEE Trans. on Pattern Analysis & Machine Intelligence, 39, 4, pp. 640-651, (2014)
  • [5] Krizhevsky A, Sutskever I, Hinton GE., ImageNet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems, 25, pp. 1097-1105, (2012)
  • [6] Simonyan K, Zisserman A, Very deep convolutional networks for large-scale image recognition, Proc. of the Int'l Conf. on Learning Representations, pp. 1-14, (2015)
  • [7] Szegedy C, Vanhoucke V, Ioffe S, Et al., Rethinking the inception architecture for computer vision, Proc. of the Conf. on Computer Vision and Pattern Recognition, pp. 2818-2826, (2016)
  • [8] He K, Zhang X, Ren S, Et al., Deep residual learning for image recognition, Proc. of the Conf. on Computer Vision and Pattern Recognition, pp. 770-778, (2016)
  • [9] Song M, Zhong K, Zhang J, Et al., In-situ AI: Towards autonomous and incremental deep learning for IoT systems, Proc. of the Int'l Symp. on High Performance Computer Architecture (HPCA), pp. 92-103, (2018)
  • [10] Wang Y, Huang XD, Guo ST., Indoor fingerprint location algorithm based on convolutional neural network, Ruan Jian Xue Bao/ Journal of Software, 29, pp. 63-72, (2018)