Besting the Black-Box: Barrier Zones for Adversarial Example Defense

被引:1
|
作者
Mahmood, Kaleel [1 ]
Phuong Ha Nguyen [2 ]
Nguyen, Lam M. [3 ]
Nguyen, Thanh [4 ]
Van Dijk, Marten [5 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] eBay Inc, San Jose, CA 95125 USA
[3] Thomas J Watson Res Ctr, IBM Res, Yorktown Hts, NY 10562 USA
[4] Amazon Inc, Seattle, WA 98109 USA
[5] CWI Amsterdam, NL-1098 Amsterdam, Netherlands
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Adversarial machine learning; adversarial examples; adversarial defense; black-box attack; security; deep learning;
D O I
10.1109/ACCESS.2021.3138966
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial machine learning defenses have primarily been focused on mitigating static, white-box attacks. However, it remains an open question whether such defenses are robust under an adaptive black-box adversary. In this paper, we specifically focus on the black-box threat model and make the following contributions: First we develop an enhanced adaptive black-box attack which is experimentally shown to be >= 30% more effective than the original adaptive black-box attack proposed by Papernot et al. For our second contribution, we test 10 recent defenses using our new attack and propose our own black-box defense (barrier zones). We show that our defense based on barrier zones offers significant improvements in security over state-of-the-art defenses. This improvement includes greater than 85% robust accuracy against black-box boundary attacks, transfer attacks and our new adaptive black-box attack, for the datasets we study. For completeness, we verify our claims through extensive experimentation with 10 other defenses using three adversarial models (14 different black-box attacks) on two datasets (CIFAR-10 and Fashion-MNIST).
引用
收藏
页码:1451 / 1474
页数:24
相关论文
共 50 条
  • [41] Substitute Meta-Learning for Black-Box Adversarial Attack
    Hu, Cong
    Xu, Hao-Qi
    Wu, Xiao-Jun
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 2472 - 2476
  • [42] ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples
    Liu, Guanxiong
    Khalil, Issa
    Khreishah, Abdallah
    Algosaibi, Abdulelah
    Aldalbahi, Adel
    Alnaeem, Mohammed
    Alhumam, Abdulaziz
    Anan, Muhammad
    IEEE ACCESS, 2020, 8 : 197086 - 197096
  • [43] Sensitive region-aware black-box adversarial attacks
    Lin, Chenhao
    Han, Sicong
    Zhu, Jiongli
    Li, Qian
    Shen, Chao
    Zhang, Youwei
    Guan, Xiaohong
    INFORMATION SCIENCES, 2023, 637
  • [44] Fortifying Machine Learning-Powered Intrusion Detection: A Defense Strategy Against Adversarial Black-Box Attacks
    Pujari, Medha
    Sun, Weiqing
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 655 - 671
  • [45] MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors
    Zhong, Fangtian
    Cheng, Xiuzhen
    Yu, Dongxiao
    Gong, Bei
    Song, Shuaiwen
    Yu, Jiguo
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (04) : 980 - 993
  • [46] Black-box Adversarial Examples against Intelligent Beamforming in 5G Networks
    Zolotukhin, Mikhail
    Miraghaie, Parsa
    Zhang, Di
    Hamalainen, Timo
    Ke, Wang
    Dunderfelt, Marja
    2022 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING, CSCN, 2022, : 64 - 70
  • [47] Attention-guided transformation-invariant attack for black-box adversarial examples
    Zhu, Jiaqi
    Dai, Feng
    Yu, Lingyun
    Xie, Hongtao
    Wang, Lidong
    Wu, Bo
    Zhang, Yongdong
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (05) : 3142 - 3165
  • [48] Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems
    Ye, Jianbin
    Lin, Fuqiang
    Liu, Xiaoyuan
    Liu, Bo
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 692 - 699
  • [49] Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study
    Li, Xurong
    Ji, Shouling
    Han, Meng
    Ji, Juntao
    Ren, Zhenyu
    Liu, Yushan
    Wu, Chunming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1933 - 1949
  • [50] FLDATN: Black-Box Attack for Face Liveness Detection Based on Adversarial Transformation Network
    Peng, Yali
    Liu, Jianbo
    Long, Min
    Peng, Fei
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2024, 2024