Dynamic defenses and the transferability of adversarial examples

被引:1
作者
Thomas, Sam [1 ]
Koleini, Farnoosh [1 ]
Tabrizi, Nasseh [1 ]
机构
[1] East Carolina Univ, Dept Comp Sci, Greenville, NC 27858 USA
来源
2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA | 2022年
关键词
adversarial machine learning; black-box attacks; dynamic defenses;
D O I
10.1109/TPS-ISA56441.2022.00041
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial learners are generally open to adversarial attacks. The field of adversarial machine learning focuses on this study when a machine learning system is in an adversarial environment. In fact, machine learning systems can be trained to produce adversarial inputs against such a learner, which is frequently done. Although can take measures to protect a machine learning system, the protection is not complete and is not guaranteed to last. This is still an open issue due to the transferability of adversarial examples. The main goal of this study is to examine the effectiveness of black-box attacks on a dynamic model. This study investigates the currently intractable problem of transferable adversarial examples, as well as a little-explored approach that could provide a solution, implementing the Fast Model-based Online Manifold Regularization (FMOMR) algorithm which is a recent published algorithm that seemed to fit the needs of our experiment.
引用
收藏
页码:276 / 284
页数:9
相关论文
共 50 条
[31]   Enhancing adversarial attack transferability with multi-scale feature attack [J].
Sun, Caixia ;
Zou, Lian ;
Fan, Cien ;
Shi, Yu ;
Liu, Yifeng .
INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2021, 19 (02)
[32]   Enhancing Adversarial Transferability on Vision Transformer by Permutation-Invariant Attacks [J].
Deng, Haoyu ;
Fang, Yanmei ;
Huang, Fangjun .
2024 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME 2024, 2024,
[33]   Black-box adversarial transferability: An empirical study in cybersecurity perspective [J].
Roshan, Khushnaseeb ;
Zafar, Aasim .
COMPUTERS & SECURITY, 2024, 141
[34]   DEVELOPING HESSIAN-FREE SECOND-ORDER ADVERSARIAL EXAMPLES FOR ADVERSARIAL TRAINING [J].
Qian, Yaguan ;
Zhang, Liangjian ;
Wang, Yuqi ;
Ji, Boyuan ;
Yao, Tengteng ;
Wang, Bin .
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2024, 34 (03) :425-438
[35]   Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks [J].
Taheri, Shayan ;
Khormali, Aminollah ;
Salem, Milad ;
Yuan, Jiann-Shiun .
BIG DATA AND COGNITIVE COMPUTING, 2020, 4 (02) :1-15
[36]   A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning [J].
Sadeghi, Koosha ;
Banerjee, Ayan ;
Gupta, Sandeep K. S. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (04) :450-467
[37]   Kernel-based adversarial attacks and defenses on support vector classification [J].
Li, Wanman ;
Liu, Xiaozhang ;
Yan, Anli ;
Yang, Jie .
DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (04) :492-497
[38]   Evaluating the Effectiveness of Attacks and Defenses on Machine Learning Through Adversarial Samples [J].
Gala, Viraj R. ;
Schneider, Martin A. .
2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW, 2023, :90-97
[39]   Adversarial attacks and defenses on text-to-image diffusion models: A survey [J].
Zhang, Chenyu ;
Hu, Mingwang ;
Li, Wenhui ;
Wang, Lanjun .
INFORMATION FUSION, 2025, 114
[40]   Universal Website Fingerprinting Defense Based on Adversarial Examples [J].
Hou, Chengshang ;
Shi, Junzheng ;
Cui, Mingxin ;
Liu, Mengyan ;
Yu, Jing .
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, :99-106