Besting the Black-Box: Barrier Zones for Adversarial Example Defense

被引:1
|
作者
Mahmood, Kaleel [1 ]
Phuong Ha Nguyen [2 ]
Nguyen, Lam M. [3 ]
Nguyen, Thanh [4 ]
Van Dijk, Marten [5 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] eBay Inc, San Jose, CA 95125 USA
[3] Thomas J Watson Res Ctr, IBM Res, Yorktown Hts, NY 10562 USA
[4] Amazon Inc, Seattle, WA 98109 USA
[5] CWI Amsterdam, NL-1098 Amsterdam, Netherlands
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Adversarial machine learning; adversarial examples; adversarial defense; black-box attack; security; deep learning;
D O I
10.1109/ACCESS.2021.3138966
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial machine learning defenses have primarily been focused on mitigating static, white-box attacks. However, it remains an open question whether such defenses are robust under an adaptive black-box adversary. In this paper, we specifically focus on the black-box threat model and make the following contributions: First we develop an enhanced adaptive black-box attack which is experimentally shown to be >= 30% more effective than the original adaptive black-box attack proposed by Papernot et al. For our second contribution, we test 10 recent defenses using our new attack and propose our own black-box defense (barrier zones). We show that our defense based on barrier zones offers significant improvements in security over state-of-the-art defenses. This improvement includes greater than 85% robust accuracy against black-box boundary attacks, transfer attacks and our new adaptive black-box attack, for the datasets we study. For completeness, we verify our claims through extensive experimentation with 10 other defenses using three adversarial models (14 different black-box attacks) on two datasets (CIFAR-10 and Fashion-MNIST).
引用
收藏
页码:1451 / 1474
页数:24
相关论文
共 50 条
  • [31] High-transferability black-box attack of binary image segmentation via adversarial example augmentation
    Zhu, Xuebiao
    Chen, Wu
    Jiang, Qiuping
    DISPLAYS, 2025, 87
  • [32] DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense
    Li, Miles Q.
    Fung, Benjamin C. M.
    Charland, Philippe
    INFORMATION SCIENCES, 2022, 601 : 357 - 373
  • [33] GenDroid: A query-efficient black-box android adversarial attack framework
    Xu, Guangquan
    Shao, Hongfei
    Cui, Jingyi
    Bai, Hongpeng
    Li, Jiliang
    Bai, Guangdong
    Liu, Shaoying
    Meng, Weizhi
    Zheng, Xi
    COMPUTERS & SECURITY, 2023, 132
  • [34] Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm
    Liu, Xinhao
    Yang, Hao
    Yan, Qiao
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1509 - 1514
  • [35] Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey
    Alatwi, Huda Ali
    Aldweesh, Amjad
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 34 - 40
  • [36] A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space
    Li, Lyue
    Rezapour, Amir
    Tzeng, Wen-Guey
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [37] Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data
    Shi, Yi
    Sagduyu, Yalin E.
    Davaslioglu, Kemal
    Li, Jason H.
    2018 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2018, : 453 - 458
  • [38] An Adversarial Network-based Multi-model Black-box Attack
    Lin, Bin
    Chen, Jixin
    Zhang, Zhihong
    Lai, Yanlin
    Wu, Xinlong
    Tian, Lulu
    Cheng, Wangchi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (02) : 641 - 649
  • [39] SPADE: A Spectral Method for Black-Box Adversarial Robustness Evaluation
    Cheng, Wuxinlin
    Deng, Chenhui
    Zhao, Zhiqiang
    Cai, Yaohui
    Zhang, Zhiru
    Feng, Zhuo
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [40] Evolutionary Multilabel Adversarial Examples: An Effective Black-Box Attack
    Kong L.
    Luo W.
    Zhang H.
    Liu Y.
    Shi Y.
    IEEE Transactions on Artificial Intelligence, 2023, 4 (03): : 562 - 572