GM-Attack: Improving the Transferability of Adversarial Attacks

被引:8
|
作者
Hong, Jinbang [1 ,2 ]
Tang, Keke [3 ]
Gao, Chao [2 ]
Wang, Songxin [4 ]
Guo, Sensen [5 ]
Zhu, Peican [2 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710072, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Shaanxi, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Guangdong, Peoples R China
[4] Shanghai Univ Finance & Econ, Sch Informat Management & Engn, Shanghai 200433, Peoples R China
[5] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Deep neural networks; Adversarial attack; Adversarial examples; Data augmentation; White-box/black-box attack; Transferability;
D O I
10.1007/978-3-031-10989-8_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the real world, blackbox attacks seem to be widely existed due to the lack of detailed information of models to be attacked. Hence, it is desirable to obtain adversarial examples with high transferability which will facilitate practical adversarial attacks. Instead of adopting traditional input transformation approaches, we propose a mechanism to derive masked images through removing some regions from the initial input images. In this manuscript, the removed regions are spatially uniformly distributed squares. For comparison, several transferable attack methods are adopted as the baselines. Eventually, extensive empirical evaluations are conducted on the standard ImageNet dataset to validate the effectiveness of GM-Attack. As indicated, our GM-Attack can craft more transferable adversarial examples compared with other input transformation methods and attack success rate on Inc-v4 has been improved by 6.5% over state-of-the-art methods.
引用
收藏
页码:489 / 500
页数:12
相关论文
共 50 条
  • [31] Enhancing Adversarial Example Transferability with an Intermediate Level Attack
    Huang, Qian
    Katsman, Isay
    He, Horace
    Gu, Zeqi
    Belongie, Serge
    Lim, Ser-Nam
    2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 4732 - 4741
  • [32] SGMA: a novel adversarial attack approach with improved transferability
    Zhu, Peican
    Hong, Jinbang
    Li, Xingyu
    Tang, Keke
    Wang, Zhen
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) : 6051 - 6063
  • [33] Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack
    Zhang, Rui
    Xia, Hui
    Kang, Zi
    Li, Zhengheng
    Du, Yu
    Gao, Mingyang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25625 - 25636
  • [34] Boosting Adversarial Transferability via Gradient Relevance Attack
    Zhu, Hegui
    Ren, Yuchen
    Sui, Xiaoyan
    Yang, Lianping
    Jiang, Wuming
    2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION, ICCV, 2023, : 4718 - 4727
  • [35] Improving Transferability of Adversarial Examples with Input Diversity
    Xie, Cihang
    Zhang, Zhishuai
    Zhou, Yuyin
    Bai, Song
    Wang, Jianyu
    Ren, Zhou
    Yuille, Alan
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 2725 - 2734
  • [36] Improving the transferability of adversarial examples with path tuning
    Li, Tianyu
    Li, Xiaoyu
    Ke, Wuping
    Tian, Xuwei
    Zheng, Desheng
    Lu, Chao
    APPLIED INTELLIGENCE, 2024, 54 (23) : 12194 - 12214
  • [37] Improving adversarial transferability through hybrid augmentation
    Zhu, Peican
    Fan, Zepeng
    Guo, Sensen
    Tang, Keke
    Li, Xingyu
    COMPUTERS & SECURITY, 2024, 139
  • [38] IMPROVING ADVERSARIAL TRANSFERABILITY VIA FEATURE TRANSLATION
    Kim, Yoonji
    Cho, Seungju
    Byun, Junyoung
    Kwon, Myung-Joon
    Kim, Changick
    2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2023, : 3359 - 3363
  • [39] Improving the transferability of adversarial samples with channel switching
    Ling, Jie
    Chen, Xiaohuan
    Luo, Yu
    APPLIED INTELLIGENCE, 2023, 53 (24) : 30580 - 30592
  • [40] Improving the transferability of adversarial samples with channel switching
    Jie Ling
    Xiaohuan Chen
    Yu Luo
    Applied Intelligence, 2023, 53 : 30580 - 30592