Dynamic defenses and the transferability of adversarial examples

被引:1
作者
Thomas, Sam [1 ]
Koleini, Farnoosh [1 ]
Tabrizi, Nasseh [1 ]
机构
[1] East Carolina Univ, Dept Comp Sci, Greenville, NC 27858 USA
来源
2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA | 2022年
关键词
adversarial machine learning; black-box attacks; dynamic defenses;
D O I
10.1109/TPS-ISA56441.2022.00041
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial learners are generally open to adversarial attacks. The field of adversarial machine learning focuses on this study when a machine learning system is in an adversarial environment. In fact, machine learning systems can be trained to produce adversarial inputs against such a learner, which is frequently done. Although can take measures to protect a machine learning system, the protection is not complete and is not guaranteed to last. This is still an open issue due to the transferability of adversarial examples. The main goal of this study is to examine the effectiveness of black-box attacks on a dynamic model. This study investigates the currently intractable problem of transferable adversarial examples, as well as a little-explored approach that could provide a solution, implementing the Fast Model-based Online Manifold Regularization (FMOMR) algorithm which is a recent published algorithm that seemed to fit the needs of our experiment.
引用
收藏
页码:276 / 284
页数:9
相关论文
共 50 条
[41]   IMPROVING ROBUSTNESS TO ADVERSARIAL EXAMPLES BY ENCOURAGING DISCRIMINATIVE FEATURES [J].
Agarwal, Chirag ;
Anh Nguyen ;
Schonfeld, Dan .
2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, :3801-3805
[42]   Adversarial Examples Detection of Electromagnetic Signal Based on GAN [J].
Zhu, Jiawei ;
Li, Jiangpeng ;
Xu, Dongwei ;
Gu, Chuntao ;
Xuan, Qi ;
Wang, Shunling .
2022 8TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS, BIGCOM, 2022, :38-43
[43]   Effective Adversarial Examples Identification of Credit Card Transactions [J].
Tsai, Min-Yan ;
Cho, Hsin-Hung ;
Yu, Chia-Mu ;
Chang, Yao-Chung ;
Chao, Han-Chieh .
IEEE INTELLIGENT SYSTEMS, 2024, 39 (04) :50-59
[44]   On the Defense Against Adversarial Examples Beyond the Visible Spectrum [J].
Ortiz, Anthony ;
Fuentes, Olac ;
Rosario, Dalton ;
Kiekintveld, Christopher .
2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, :553-558
[45]   Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks [J].
Co, Kenneth T. ;
Munoz-Gonzalez, Luis ;
de Maupeou, Sixte ;
Lupu, Emil C. .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :275-289
[46]   Generating adversarial examples without specifying a target model [J].
Yang, Gaoming ;
Li, Mingwei ;
Fang, Xianjing ;
Zhang, Ji ;
Liang, Xingzhu .
PEERJ COMPUTER SCIENCE, 2021, 7
[47]   Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks [J].
Zhou, Yan ;
Kantarcioglu, Murat ;
Xi, Bowei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) :83-99
[48]   Characterizing and Evaluating Adversarial Examples for Offline Handwritten Signature Verification [J].
Hafemann, Luiz G. ;
Sabourin, Robert ;
Oliveira, Luiz S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) :2153-2166
[49]   CSA: Crafting adversarial examples via content and style attacks [J].
Chen, Wei ;
Zhang, Yunqi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
[50]   On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples [J].
Zolotukhin, Mikhail ;
Miraghaei, Parsa ;
Zhang, Di ;
Hamalainen, Timo .
IEEE ACCESS, 2022, 10 :126285-126303