Rethinking the optimization objective for transferable adversarial examples from a fuzzy perspective

被引:0
作者
Yang, Xiangyuan [1 ]
Lin, Jie [1 ]
Zhang, Hanlin [2 ]
Zhao, Peng [1 ]
机构
[1] Xi'an Jiaotong Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[2] Qingdao Univ, Qingdao, Peoples R China
关键词
Adversarial examples; Transferability; Fuzzy domain; Fuzzy optimization;
D O I
10.1016/j.neunet.2024.107019
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Transferable adversarial examples, which are generated by transfer-based attacks, have strong adaptability for attacking a completely unfamiliar victim model without knowing its architecture, parameters and outputs. While current transfer-based attacks easily defeat surrogate model with minor perturbations, they struggle to transfer these perturbations to unfamiliar victim models. To characterize these untransferable adversarial examples, which consist of natural examples and perturbations, we define the concept of fuzzy domain. Here, the adversarial examples that do not fall inside the fuzzy domain will successfully attack the victim model. To assist the adversarial examples in escaping from the fuzzy domain, we propose a fuzzy optimization-based transferable attack (FOTA) to maximize both the original cross-entropy (CE) loss and the newly proposed membership functions. The proposed membership functions are positively correlated to the probability of falling outside the fuzzy domain. Furthermore, to maximize the transferability of adversarial examples, we present Adaptive FOTA (Ada-FOTA), which dynamically updates the adversarial examples until the membership functions converge, rather than fixing the number of update iterations in advance in the current attacks. When the membership functions converge to 1, the maximum probability that adversarial examples fall outside the fuzzy domain can be achieved. The empirical results on ImageNet dataset show that, for minor perturbations, our FOTA can improve the transferability of adversarial examples by 5.4% on attacking five naturally-trained victim models, and Ada-FOTA can further increase the transferability of adversarial examples by an additional 13.8% in comparison with current transfer-based attacks. Code is available at https://github.com/HaloMoto/FOTA.
引用
收藏
页数:18
相关论文
共 54 条
  • [1] Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input
    Byun, Junyoung
    Cho, Seungju
    Kwon, Myung-Joon
    Kim, Hee-Seon
    Kim, Changick
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15223 - 15232
  • [2] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [3] Clinical characteristics and intrauterine vertical transmission potential of COVID-19 infection in nine pregnant women: a retrospective review of medical records
    Chen, Huijun
    Guo, Juanjuan
    Wang, Chen
    Luo, Fan
    Yu, Xuechen
    Zhang, Wei
    Li, Jiafu
    Zhao, Dongchi
    Xu, Dan
    Gong, Qing
    Liao, Jing
    Yang, Huixia
    Hou, Wei
    Zhang, Yuanzhen
    [J]. LANCET, 2020, 395 (10226) : 809 - 815
  • [4] Cohen J, 2019, PR MACH LEARN RES, V97
  • [5] Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
    Dong, Yinpeng
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4307 - 4316
  • [6] Boosting Adversarial Attacks with Momentum
    Dong, Yinpeng
    Liao, Fangzhou
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    Hu, Xiaolin
    Li, Jianguo
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 9185 - 9193
  • [7] Gao Lianli, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12373), P307, DOI 10.1007/978-3-030-58604-1_19
  • [8] Ge ZJ, 2023, Arxiv, DOI arXiv:2308.10601
  • [9] Ge ZJ, 2023, Arxiv, DOI arXiv:2306.05225
  • [10] Goodfellow IJ, 2014, PREPRINT, DOI DOI 10.48550/ARXIV.1412.6572