Enhancing adversarial transferability with local transformation

被引:0
作者
Zhang, Yang [1 ]
Hong, Jinbang [2 ]
Bai, Qing [3 ]
Liang, Haifeng [1 ]
Zhu, Peican [4 ]
Song, Qun [5 ]
机构
[1] Xian Technol Univ, Sch Optoelect Engn, Xian 710021, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Comp Sci, Xian 710072, Shaanxi, Peoples R China
[3] North Electroo Opt CO LTD, Xian 710043, Shaanxi, Peoples R China
[4] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Shaanxi, Peoples R China
[5] Northwestern Polytech Univ, Sch Automat, Xian 710072, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep neural networks; Adversarial examples; Transferable attack; Adversarial transferability; NEONATAL SLEEP;
D O I
10.1007/s40747-024-01628-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Robust deep learning models have demonstrated significant applicability in real-world scenarios. The utilization of adversarial attacks plays a crucial role in assessing the robustness of these models. Among such attacks, transfer-based attacks, which leverage white-box models to generate adversarial examples, have garnered considerable attention. These transfer-based attacks have demonstrated remarkable efficiency, particularly under the black-box setting. Notably, existing transfer attacks often exploit input transformations to amplify their effectiveness. However, prevailing input transformation-based methods typically modify input images indiscriminately, overlooking regional disparities. To bolster the transferability of adversarial examples, we propose the Local Transformation Attack (LTA) based on forward class activation maps. Specifically, we first obtain future examples through accumulated momentum and compute forward class activation maps. Subsequently, we utilize these maps to identify crucial areas and apply pixel scaling for transformation. Finally, we update the adversarial examples by using the average gradient of the transformed image. Extensive experiments convincingly demonstrate the effectiveness of our proposed LTA. Compared to the current state-of-the-art attack approaches, LTA achieves an increase of 7.9% in black-box attack performance. Particularly, in the case of ensemble attacks, our method achieved an average attack success rate of 98.3%.
引用
收藏
页数:13
相关论文
共 46 条
[1]   EEG-Based Neonatal Sleep Stage Classification Using Ensemble Learning [J].
Abbasi, Saadullah Farooq ;
Jamil, Harun ;
Chen, Wei .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03) :4619-4633
[2]   EEG-Based Neonatal Sleep-Wake Classification Using Multilayer Perceptron Neural Network [J].
Abbasi, Saadullah Farooq ;
Ahmad, Jawad ;
Tahir, Ahsen ;
Awais, Muhammad ;
Chen, Chen ;
Irfan, Muhammad ;
Siddiqa, Hafiza Ayesha ;
Waqas, Abu Bakar ;
Long, Xi ;
Yin, Bin ;
Akbarzadeh, Saeed ;
Lu, Chunmei ;
Wang, Laishuan ;
Chen, Wei .
IEEE ACCESS, 2020, 8 :183025-183034
[3]   A Hybrid DCNN-SVM Model for Classifying Neonatal Sleep and Wake States Based on Facial Expressions in Video [J].
Awais, Muhammad ;
Long, Xi ;
Yin, Bin ;
Farooq Abbasi, Saadullah ;
Akbarzadeh, Saeed ;
Lu, Chunmei ;
Wang, Xinhua ;
Wang, Laishuan ;
Zhang, Jiong ;
Dudink, Jeroen ;
Chen, Wei .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2021, 25 (05) :1441-1449
[4]   Query efficient black-box adversarial attack on deep neural networks [J].
Bai, Yang ;
Wang, Yisen ;
Zeng, Yuyuan ;
Jiang, Yong ;
Xia, Shu-Tao .
PATTERN RECOGNITION, 2023, 133
[5]   Siamese Implicit Region Proposal Network With Compound Attention for Visual Tracking [J].
Chan, Sixian ;
Tao, Jian ;
Zhou, Xiaolong ;
Bai, Cong ;
Zhang, Xiaoqin .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 31 :1882-1894
[6]  
Cohen J, 2019, PR MACH LEARN RES, V97
[7]   Transferable adversarial distribution learning: Query-efficient adversarial attack against large language models [J].
Dong, Huoyuan ;
Dong, Jialiang ;
Wan, Shaohua ;
Yuan, Shuai ;
Guan, Zhitao .
COMPUTERS & SECURITY, 2023, 135
[8]   Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks [J].
Dong, Yinpeng ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :4307-4316
[9]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[10]  
Goodfellow I. J., 2015, 3 INT C LEARN REPR I