TAGA: A Transfer-based Black-box Adversarial Attack with Genetic Algorithms

被引:0
|
作者
Huang, Liang-Jung [1 ]
Yu, Tian-Li [1 ]
机构
[1] Natl Taiwan Univ, Taiwan Evolutionary Intelligence Lab, Dept Elect Engn, Taipei, Taiwan
来源
PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22) | 2022年
关键词
Deep Learning; Neural Networks; Adversarial Attacks; Genetic; Algorithms;
D O I
10.1145/3512290.3528699
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has been widely adopted in many real-world applications, especially in image classification. However, researches have shown that minor distortions imperceptible to humans may mislead classifiers. One way to improve the robustness is using adversarial attacks to obtain adversarial examples and re-training the classifier with those images. However, the connections between attacks and application scenarios are rarely discussed. This paper proposes a novel black-box adversarial attack that is specifically designed for real-world application scenarios: The transfer-based black-box adversarial attack with genetic algorithms (TAGA). TAGA adopts a genetic algorithm to generate the adversarial examples and reduces the ensuing query costs with a surrogate model based on the transferability of adversarial attacks. Empirical results show that perturbing embeddings in the latent space helps the attack algorithm quickly obtain adversarial examples and that the surrogate fitness function reduces the number of function evaluations. Compared with several state-of-the-art attacks, TAGA improves the classifiers more under the application scenario in terms of the summation of natural and defense accuracy.
引用
收藏
页码:712 / 720
页数:9
相关论文
共 50 条
  • [21] FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency
    Hu, Xiaoxue
    Liu, Geling
    Zheng, Baolin
    Zhao, Lingchen
    Wang, Qian
    Zhang, Yufei
    Du, Minxin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2398 - 2411
  • [22] FABRICATE-VANISH: AN EFFECTIVE AND TRANSFERABLE BLACK-BOX ADVERSARIAL ATTACK INCORPORATING FEATURE DISTORTION
    Lu, Yantao
    Du, Xueying
    Sun, Bingkun
    Ren, Haining
    Velipasalar, Senem
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 809 - 813
  • [23] Pixle: a fast and effective black-box attack based on rearranging pixels
    Pomponi, Jary
    Scardapane, Simone
    Uncini, Aurelio
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [24] Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
    Aithal, Manjushree B.
    Li, Xiaohua
    IEEE ACCESS, 2022, 10 : 12395 - 12411
  • [25] Physical Black-Box Adversarial Attacks Through Transformations
    Jiang, Wenbo
    Li, Hongwei
    Xu, Guowen
    Zhang, Tianwei
    Lu, Rongxing
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 964 - 974
  • [26] Black-box Adversarial Attacks in Autonomous Vehicle Technology
    Kumar, K. Naveen
    Vishnu, C.
    Mitra, Reshmi
    Mohan, C. Krishna
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [27] A review of black-box adversarial attacks on image classification
    Zhu, Yanfei
    Zhao, Yaochi
    Hu, Zhuhua
    Luo, Tan
    He, Like
    NEUROCOMPUTING, 2024, 610
  • [28] Generating Black-Box Adversarial Examples in Sparse Domain
    Zanddizari, Hadi
    Zeinali, Behnam
    Chang, J. Morris
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (04): : 795 - 804
  • [29] We might be afraid of black-box algorithms
    Veliz, Carissa
    Prunkl, Carina
    Phillips-Brown, Milo
    Lechterman, Theodore M.
    JOURNAL OF MEDICAL ETHICS, 2021, 47 (05) : 339 - 340
  • [30] Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm
    Liu, Xinhao
    Yang, Hao
    Yan, Qiao
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1509 - 1514