Superpixel Attack Enhancing Black-Box Adversarial Attack with Image-Driven Division Areas

被引:0
|
作者
Oe, Issa [1 ]
Yamamura, Keiichiro [1 ]
Ishikura, Hiroki [1 ]
Hamahira, Ryo [1 ]
Fujisawa, Katsuki [2 ]
机构
[1] Kyushu Univ, Grad Sch Math, Fukuoka, Japan
[2] Kyushu Univ, Inst Math Ind, Fukuoka, Japan
来源
ADVANCES IN ARTIFICIAL INTELLIGENCE, AI 2023, PT I | 2024年 / 14471卷
基金
日本科学技术振兴机构;
关键词
adversarial attack; security for AI; computer vision; deep learning;
D O I
10.1007/978-981-99-8388-9_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep learning models are used in safety-critical tasks such as automated driving and face recognition. However, small perturbations in the model input can significantly change the predictions. Adversarial attacks are used to identify small perturbations that can lead to misclassifications. More powerful black-box adversarial attacks are required to develop more effective defenses. A promising approach to black-box adversarial attacks is to repeat the process of extracting a specific image area and changing the perturbations added to it. Existing attacks adopt simple rectangles as the areas where perturbations are changed in a single iteration. We propose applying superpixels instead, which achieve a good balance between color variance and compactness. We also propose a new search method, versatile search, and a novel attack method, Superpixel Attack, which applies superpixels and performs versatile search. Superpixel Attack improves attack success rates by an average of 2.10% compared with existing attacks. Most models used in this study are robust against adversarial attacks, and this improvement is significant for blackbox adversarial attacks. The code is available at https://github.com/oe1307/SuperpixelAttack.git.
引用
收藏
页码:141 / 152
页数:12
相关论文
共 50 条
  • [21] TAGA: A Transfer-based Black-box Adversarial Attack with Genetic Algorithms
    Huang, Liang-Jung
    Yu, Tian-Li
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22), 2022, : 712 - 720
  • [22] Universal Black-Box Adversarial Attack on Deep Learning for Specific Emitter Identification
    Chen, Kailun
    Zhang, Yibin
    Cai, Zhenxin
    Wang, Yu
    Ye, Chen
    Lin, Yun
    Gui, Guan
    2024 IEEE 99TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2024-SPRING, 2024,
  • [23] Black-Box Adversarial Attack via Topological Adaptive Particle Swarm Optimization
    Yu Z.
    Kang J.
    Ye O.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2023, 35 (08): : 1239 - 1248
  • [24] BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts
    Han, Xu
    Li, Qiang
    Cao, Hongbo
    Han, Lei
    Wang, Bin
    Bao, Xuhua
    Han, Yufei
    Wang, Wei
    COMPUTERS & SECURITY, 2024, 141
  • [25] A New Meta-learning-based Black-box Adversarial Attack: SA-CC
    Ding, Jianyu
    Chen, Zhiyu
    2022 34TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2022, : 4326 - 4331
  • [26] Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition
    Chen, Jiefu
    Chen, Tong
    Xu, Xing
    Zhang, Jingran
    Yang, Yang
    Shen, Heng Tao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1547 - 1560
  • [27] An Approximated Gradient Sign Method Using Differential Evolution for Black-Box Adversarial Attack
    Li, Chao
    Wang, Handing
    Zhang, Jun
    Yao, Wen
    Jiang, Tingsong
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2022, 26 (05) : 976 - 990
  • [28] DeeBBAA: A Benchmark Deep Black-Box Adversarial Attack Against CyberPhysical Power Systems
    Bhattacharjee, Arnab
    Bai, Guangdong
    Tushar, Wayes
    Verma, Ashu
    Mishra, Sukumar
    Saha, Tapan K.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40670 - 40688
  • [29] SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
    Guan, Yuting
    He, Junjiang
    Li, Tao
    Zhao, Hui
    Ma, Baoqiang
    FUTURE INTERNET, 2023, 15 (04):
  • [30] Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models
    Zhou, Chuan
    Jing, Huiyun
    He, Xin
    Wang, Liming
    Chen, Kai
    Ma, Duohe
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT I, 2021, 12918 : 119 - 135