Besting the Black-Box: Barrier Zones for Adversarial Example Defense

被引:1
|
作者
Mahmood, Kaleel [1 ]
Phuong Ha Nguyen [2 ]
Nguyen, Lam M. [3 ]
Nguyen, Thanh [4 ]
Van Dijk, Marten [5 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] eBay Inc, San Jose, CA 95125 USA
[3] Thomas J Watson Res Ctr, IBM Res, Yorktown Hts, NY 10562 USA
[4] Amazon Inc, Seattle, WA 98109 USA
[5] CWI Amsterdam, NL-1098 Amsterdam, Netherlands
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Adversarial machine learning; adversarial examples; adversarial defense; black-box attack; security; deep learning;
D O I
10.1109/ACCESS.2021.3138966
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial machine learning defenses have primarily been focused on mitigating static, white-box attacks. However, it remains an open question whether such defenses are robust under an adaptive black-box adversary. In this paper, we specifically focus on the black-box threat model and make the following contributions: First we develop an enhanced adaptive black-box attack which is experimentally shown to be >= 30% more effective than the original adaptive black-box attack proposed by Papernot et al. For our second contribution, we test 10 recent defenses using our new attack and propose our own black-box defense (barrier zones). We show that our defense based on barrier zones offers significant improvements in security over state-of-the-art defenses. This improvement includes greater than 85% robust accuracy against black-box boundary attacks, transfer attacks and our new adaptive black-box attack, for the datasets we study. For completeness, we verify our claims through extensive experimentation with 10 other defenses using three adversarial models (14 different black-box attacks) on two datasets (CIFAR-10 and Fashion-MNIST).
引用
收藏
页码:1451 / 1474
页数:24
相关论文
共 50 条
  • [1] GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
    Fan, Xinxin
    Li, Mengfan
    Zhou, Jia
    Jing, Quanliang
    Lin, Chi
    Lu, Yunfeng
    Bi, Jingping
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2038 - 2048
  • [2] Generating Black-Box Adversarial Examples in Sparse Domain
    Zanddizari, Hadi
    Zeinali, Behnam
    Chang, J. Morris
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (04): : 795 - 804
  • [3] Black-Box Audio Adversarial Example Generation Using Variational Autoencoder
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 142 - 160
  • [4] Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks
    Mahmood, Kaleel
    Mahmood, Rigel
    Rathbun, Ethan
    van Dijk, Marten
    IEEE ACCESS, 2022, 10 : 998 - 1019
  • [5] Physical Black-Box Adversarial Attacks Through Transformations
    Jiang, Wenbo
    Li, Hongwei
    Xu, Guowen
    Zhang, Tianwei
    Lu, Rongxing
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 964 - 974
  • [6] Black-box Adversarial Attacks on Video Recognition Models
    Jiang, Linxi
    Ma, Xingjun
    Chen, Shaoxiang
    Bailey, James
    Jiang, Yu-Gang
    PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19), 2019, : 864 - 872
  • [7] Boosting Black-Box Adversarial Attacks with Meta Learning
    Fu, Junjie
    Sun, Jian
    Wang, Gang
    2022 41ST CHINESE CONTROL CONFERENCE (CCC), 2022, : 7308 - 7313
  • [8] Mitigating Black-Box Adversarial Attacks via Output Noise Perturbation
    Aithal, Manjushree B.
    Li, Xiaohua
    IEEE ACCESS, 2022, 10 : 12395 - 12411
  • [9] Black-box Bayesian adversarial attack with transferable priors
    Zhang, Shudong
    Gao, Haichang
    Shu, Chao
    Cao, Xiwen
    Zhou, Yunyi
    He, Jianping
    MACHINE LEARNING, 2024, 113 (04) : 1511 - 1528
  • [10] Simple Black-Box Adversarial Examples Generation with Very Few Queries
    Senzaki, Yuya
    Ohata, Satsuya
    Matsuura, Kanta
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 212 - 221