On the Strengths of Pure Evolutionary Algorithms in Generating Adversarial Examples

被引:2
作者
Bartlett, Antony [1 ]
Liem, Cynthia C. S. [1 ]
Panichella, Annibale [1 ]
机构
[1] Delft Univ Technol, Delft, Netherlands
来源
2023 IEEE/ACM INTERNATIONAL WORKSHOP ON SEARCH-BASED AND FUZZ TESTING, SBFT | 2023年
关键词
differential evolution; adversarial examples; deep learning; search-based software engineering;
D O I
10.1109/SBFT59156.2023.00012
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deep learning (DL) models are known to be highly accurate, yet vulnerable to adversarial examples. While earlier research focused on generating adversarial examples using white-box strategies, later research focused on black-box strategies, as models often are not accessible to external attackers. Prior studies showed that black-box approaches based on approximate gradient descent algorithms combined with meta-heuristic search (i.e., the BMI-FGSM algorithm) outperform previously proposed white- and black-box strategies. In this paper, we propose a novel black-box approach purely based on differential evolution (DE), i.e., without using any gradient approximation method. In particular, we propose two variants of a customized DE with customized variation operators: (1) a single-objective (Pixel-SOO) variant generating attacks that fool DL models, and (2) a multi-objective variant (Pixel-MOO) that also minimizes the number of changes in generated attacks. Our preliminary study on five canonical image classification models shows that Pixel-SOO and Pixel-MOO are more effective than the state-of-the-art BMI-FGSM in generating adversarial attacks. Furthermore, Pixel-SOO is faster than Pixel-MOO, while the latter produces subtler attacks than its single-objective variant.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 39 条
[1]  
Angira R., 2005, Proceedings of the 2nd Indian International Conference on Artificial Intelligence, P1428
[2]  
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[3]   Pymoo: Multi-Objective Optimization in Python']Python [J].
Blank, Julian ;
Deb, Kalyanmoy .
IEEE ACCESS, 2020, 8 :89497-89509
[4]   EvoAttack: An Evolutionary Search-Based Adversarial Attack for Object Detection Models [J].
Chan, Kenneth ;
Cheng, Betty H. C. .
SEARCH-BASED SOFTWARE ENGINEERING, SSBSE 2022, 2022, 13711 :83-97
[5]  
Chollet F., 2015, About us
[6]   A survey on handling computationally expensive multiobjective optimization problems with evolutionary algorithms [J].
Chugh, Tinkle ;
Sindhya, Karthik ;
Hakanen, Jussi ;
Miettinen, Kaisa .
SOFT COMPUTING, 2019, 23 (09) :3137-3166
[7]  
Conover William Jay, 1998, Practical nonparametric statistics, V350
[8]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[9]  
Fisher R.A., 1992, STAT METHODS RES WOR, P66, DOI [DOI 10.1007/978-1-4612-4380-9_6, 10.1007/978-1-4612-4380-9_6]
[10]   Search-Based Adversarial Testing and Improvement of Constrained Credit Scoring Systems [J].
Ghamizi, Salah ;
Cordy, Maxime ;
Gubri, Martin ;
Papadakis, Mike ;
Boystov, Andrey ;
Le Traon, Yves ;
Goujon, Anne .
PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, :1089-1100