TAGA: A Transfer-based Black-box Adversarial Attack with Genetic Algorithms

被引:0
|
作者
Huang, Liang-Jung [1 ]
Yu, Tian-Li [1 ]
机构
[1] Natl Taiwan Univ, Taiwan Evolutionary Intelligence Lab, Dept Elect Engn, Taipei, Taiwan
来源
PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22) | 2022年
关键词
Deep Learning; Neural Networks; Adversarial Attacks; Genetic; Algorithms;
D O I
10.1145/3512290.3528699
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has been widely adopted in many real-world applications, especially in image classification. However, researches have shown that minor distortions imperceptible to humans may mislead classifiers. One way to improve the robustness is using adversarial attacks to obtain adversarial examples and re-training the classifier with those images. However, the connections between attacks and application scenarios are rarely discussed. This paper proposes a novel black-box adversarial attack that is specifically designed for real-world application scenarios: The transfer-based black-box adversarial attack with genetic algorithms (TAGA). TAGA adopts a genetic algorithm to generate the adversarial examples and reduces the ensuing query costs with a surrogate model based on the transferability of adversarial attacks. Empirical results show that perturbing embeddings in the latent space helps the attack algorithm quickly obtain adversarial examples and that the surrogate fitness function reduces the number of function evaluations. Compared with several state-of-the-art attacks, TAGA improves the classifiers more under the application scenario in terms of the summation of natural and defense accuracy.
引用
收藏
页码:712 / 720
页数:9
相关论文
共 50 条
  • [41] Black-Box Adversarial Attacks Against SQL Injection Detection Model
    Alqhtani, Maha
    Alghazzawi, Daniyal
    Alarifi, Suaad
    CONTEMPORARY MATHEMATICS, 2024, 5 (04): : 5098 - 5112
  • [42] Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
    Zhene, Baolin
    Jiang, Peipei
    Wang, Qian
    Li, Qi
    Shen, Chao
    Wang, Cong
    Ge, Yunjie
    Teng, Qingyang
    Zhang, Shenyi
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 86 - 107
  • [43] Toward an Effective Black-Box Adversarial Attack on Functional Java']JavaScript Malware against Commercial Anti-Virus
    Tsai, Yun-Da
    Chen, ChengKuan
    Lin, Shou-De
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 4165 - 4172
  • [44] Simple Black-Box Adversarial Examples Generation with Very Few Queries
    Senzaki, Yuya
    Ohata, Satsuya
    Matsuura, Kanta
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 212 - 221
  • [45] GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
    Fan, Xinxin
    Li, Mengfan
    Zhou, Jia
    Jing, Quanliang
    Lin, Chi
    Lu, Yunfeng
    Bi, Jingping
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2038 - 2048
  • [46] Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning
    Zhang, Yinghua
    Song, Yangqiu
    Liang, Jian
    Bai, Kun
    Yang, Qiang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 2989 - 2997
  • [47] On the impact of objective function transformations on evolutionary and black-box algorithms
    Storch, Tobias
    GECCO 2005: Genetic and Evolutionary Computation Conference, Vols 1 and 2, 2005, : 833 - 840
  • [48] Ranking-Based Black-Box Complexity
    Doerr, Benjamin
    Winzen, Carola
    ALGORITHMICA, 2014, 68 (03) : 571 - 609
  • [49] White-Box or Black-Box Decision Tree Algorithms: Which to Use in Education?
    Delibasic, Boris
    Vukicevic, Milan
    Jovanovic, Milos
    Suknovic, Milija
    IEEE TRANSACTIONS ON EDUCATION, 2013, 56 (03) : 287 - 291
  • [50] Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey
    Alatwi, Huda Ali
    Aldweesh, Amjad
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 34 - 40