Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space

被引:4
作者
Wang, Shuo [1 ]
Chen, Shangyu [2 ]
Chen, Tianle [3 ]
Nepal, Surya [1 ]
Rudolph, Carsten [2 ]
Grobler, Marthie [1 ]
机构
[1] CSIRO, Data61 & Cybersecur CRC, Marsfield, NSW 2122, Australia
[2] Monash Univ, Fac Informat Technol, Melbourne, Vic 3800, Australia
[3] Univ Queensland, St Lucia, Qld 4072, Australia
关键词
Adversarial examples; feature manipulation; latent representation; neural networks; variational autoencoder (VAE);
D O I
10.1109/TNNLS.2023.3299408
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The susceptibility of deep neural networks (DNNs) to adversarial intrusions, exemplified by adversarial examples, is well-documented. Conventional attacks implement unstructured, pixel-wise perturbations to mislead classifiers, which often results in a noticeable departure from natural samples and lacks human-perceptible interpretability. In this work, we present an adversarial attack strategy that implements fine-granularity, semantic-meaning-oriented structural perturbations. Our proposed methodology manipulates the semantic attributes of images through the use of disentangled latent codes. We engineer adversarial perturbations by manipulating either a single latent code or a combination thereof. To this end, we propose two unsupervised semantic manipulation strategies: one based on vector-disentangled representation and the other on feature map-disentangled representation, taking into consideration the complexity of the latent codes and the smoothness of the reconstructed images. Our empirical evaluations, conducted extensively on real-world image data, showcase the potency of our attacks, particularly against black-box classifiers. Furthermore, we establish the existence of a universal semantic adversarial example that is agnostic to specific images.
引用
收藏
页码:17070 / 17084
页数:15
相关论文
共 39 条
[1]  
Gatys LA, 2015, Arxiv, DOI [arXiv:1508.06576, DOI 10.48550/ARXIV.1508.06576]
[2]  
[Anonymous], 2017, ICLR
[3]   Representation Learning: A Review and New Perspectives [J].
Bengio, Yoshua ;
Courville, Aaron ;
Vincent, Pascal .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) :1798-1828
[4]  
Bhattad A, 2020, Arxiv, DOI arXiv:1904.06347
[5]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[6]  
Chen Xi, 2016, Advances in Neural Information Processing Systems, V29, DOI DOI 10.1007/s00542-016-3060-7
[7]  
Donahue J., 2016, arXiv
[8]  
Engstrom L, 2019, PR MACH LEARN RES, V97
[9]  
Grosse K, 2017, Arxiv, DOI arXiv:1702.06280
[10]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778