Generating Robust Adversarial Examples against Online Social Networks (OSNs)

被引:0
作者
Liu, Jun [1 ]
Zhou, Jiantao [1 ]
Wu, Haiwei [1 ]
Sun, Weiwei [2 ]
Tian, Jinyu [3 ]
机构
[1] Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, State Key Lab Internet Things Smart City, Univ Ave, Taipa 999078, Macau, Peoples R China
[2] Alibaba Grp, 699 Wangshang Rd, Hangzhou 310052, Zhejiang, Peoples R China
[3] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Fac Innovat Engn, Weilong Rd, Taipa 999078, Macau, Peoples R China
关键词
Adversarial examples; adversarial images; robustness; online social networks; deep neural networks;
D O I
10.1145/3632528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online Social Networks (OSNs) have blossomed into prevailing transmission channels for images in the modern era. Adversarial examples (AEs) deliberately designed to mislead deep neural networks (DNNs) are found to be fragile against the inevitable lossy operations conducted by OSNs. As a result, the AEs would lose their attack capabilities after being transmitted over OSNs. In this work, we aim to design a new framework for generating robust AEs that can survive the OSN transmission; namely, the AEs before and after the OSN transmission both possess strong attack capabilities. To this end, we first propose a differentiable network termed SImulated OSN (SIO) to simulate the various operations conducted by an OSN. Specifically, the SIO network consists of two modules: (1) a differentiable JPEG layer for approximating the ubiquitous JPEG compression and (2) an encoder-decoder subnetwork for mimicking the remaining operations. Based upon the SIO network, we then formulate an optimization framework to generate robust AEs by enforcing model outputs with and without passing through the SIO to be both misled. Extensive experiments conducted over Facebook, WeChat and QQ demonstrate that our attack methods produce more robust AEs than existing approaches, especially under small distortion constraints; the performance gain in terms of Attack Success Rate (ASR) could be more than 60%. Furthermore, we build a public dataset containing more than 10,000 pairs of AEs processed by Facebook, WeChat or QQ, facilitating future research in the robust AEs generation. The dataset and code are available at https://github.com/csjunjun/RobustOSNAttack.git.
引用
收藏
页数:26
相关论文
共 62 条
[1]  
[Anonymous], 2010, P ACM INT C MULT
[2]  
Athalye A, 2018, PR MACH LEARN RES, V80
[3]  
Brendel Wieland, 2018, 6 INT C LEARNING REP
[4]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[5]   On Building Classification from Remote Sensor Imagery Using Deep Neural Networks and the Relation Between Classification and Reconstruction Accuracy Using Border Localization as Proxy [J].
Chatterjee, Bodhiswatta ;
Poullis, Charalambos .
2019 16TH CONFERENCE ON COMPUTER AND ROBOT VISION (CRV 2019), 2019, :41-48
[6]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[7]   High-Quality R-CNN Object Detection Using Multi-Path Detection Calibration Network [J].
Chen, Xiaoyu ;
Li, Hongliang ;
Wu, Qingbo ;
Ngan, King Ngi ;
Xu, Linfeng .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (02) :715-727
[8]   Noiseprint: A CNN-Based Camera Model Fingerprint [J].
Cozzolino, Davide ;
Verdoliva, Luisa .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (01) :144-159
[9]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[10]   CNN-Based Classification of Degraded Images With Awareness of Degradation Levels [J].
Endo, Kazuki ;
Tanaka, Masayuki ;
Okutomi, Masatoshi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (10) :4046-4057