Multi-task Learning-based Black-box Adversarial Attack on Face Recognition Systems

被引:0
作者
Kong, Jiefang [1 ]
Wang, Huabin [1 ]
Zhou, Jiacheng [2 ]
Tao, Liang [1 ]
Zhang, Jingjing [3 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Anhui Prov Key Lab Multimodal Cognit Computat, Hefei, Anhui, Peoples R China
[2] Anhui Univ, Stony Brook Inst, Hefei, Anhui, Peoples R China
[3] Anhui Univ, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
来源
2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP | 2024年
关键词
adversarial attacks; multi-task learning; black-box attacks; face recognition;
D O I
10.1109/ICSIP61881.2024.10671427
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, deep learning techniques have achieved significant success in many computer vision tasks. However, security concerns have increased as adversarial attacks have discovered potential vulnerabilities in deep learning-based systems. Therefore, a large number of adversarial defense strategies have been developed to improve the security and robustness of FR systems. Introducing an auxiliary model for the face recognition model to enhance the system security is a common approach for adversarial defense which the adversarial examples generated using one model are unlikely to pass when another model is chosen. Second, one of the challenges of face recognition (FR) attacks is that currently the targeted face recognition models are black-box in nature, i.e., the attacker does not have access to their internal relevant parameters and gradient information. As a result, the mobility of samples is poor and the attack performance is low, especially for online commercial FR systems. Therefore, this paper proposes a similarity-based shared gradient adversarial attack algorithm to improve the sample mobility. From the perspective of multi-tasking, the algorithm selects the alternative model (AR) as the auxiliary model, develops a multi-task local optimization strategy and a cross-task gradient mapping strategy, and constructs a mapping mechanism between the two models to share the gradient information, which facilitates weighted fusion of the generated perturbations and avoids the oscillations caused by different models due to the differences in gradients and parameters, thus improves the generalization ability, and makes the generated adversarial examples more efficient. Thus, the generated adversarial examples can attack multiple models at the same time, which greatly improves the transferability and robustness of the adversarial samples, and greatly improves the attacking power. A large number of experiments show that the success rate has been greatly improved.
引用
收藏
页码:554 / 558
页数:5
相关论文
共 25 条
[1]   Masked Face Detection and Recognition System Based on Deep Learning Algorithms [J].
Al-Dmour, Hayat ;
Tareef, Afaf ;
Alkalbani, Asma Musabah ;
Hammouri, Awni ;
Alrahmani, Ban .
JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (02) :224-232
[2]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[3]   ArcFace: Additive Angular Margin Loss for Deep Face Recognition [J].
Deng, Jiankang ;
Guo, Jia ;
Xue, Niannan ;
Zafeiriou, Stefanos .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :4685-4694
[4]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[5]   Towards Building a Facial Identification System Using Quantum Machine Learning Techniques [J].
Easom-McCaldin, Philip ;
Bouridane, Ahmed ;
Belatreche, Ammar ;
Jiang, Richard .
JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2022, 13 (02) :198-202
[6]  
Finn C, 2017, PR MACH LEARN RES, V70
[7]  
Goodfellow I., 2015, INT C LEARNING REPRE, P1
[8]  
Guo PX, 2020, Arxiv, DOI arXiv:2011.09824
[9]   Deep Neural Networks for Acoustic Modeling in Speech Recognition [J].
Hinton, Geoffrey ;
Deng, Li ;
Yu, Dong ;
Dahl, George E. ;
Mohamed, Abdel-rahman ;
Jaitly, Navdeep ;
Senior, Andrew ;
Vanhoucke, Vincent ;
Patrick Nguyen ;
Sainath, Tara N. ;
Kingsbury, Brian .
IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (06) :82-97
[10]  
Huang G. B., 2008, WORKSH FAC REALLIFE, P56