Black-box adversarial sample generation based on differential evolution

被引:30
|
作者
Lin, Junyu [1 ,2 ]
Xu, Lei [1 ,2 ]
Liu, Yingqi [3 ]
Zhang, Xiangyu [3 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
[2] Nanjing Univ, Dept Comp Sci & Technol, Nanjing, Peoples R China
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Adversarial samples; Differential evolution; Black-box testing; Deep Neural Network;
D O I
10.1016/j.jss.2020.110767
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deep Neural Networks (DNNs) are being used in various daily tasks such as object detection, speech processing, and machine translation. However, it is known that DNNs suffer from robustness problems - perturbed inputs called adversarial samples leading to misbehaviors of DNNs. In this paper, we propose a black-box technique called Black-box Momentum Iterative Fast Gradient Sign Method (BMI-FGSM) to test the robustness of DNN models. The technique does not require any knowledge of the structure or weights of the target DNN. Compared to existing white-box testing techniques that require accessing model internal information such as gradients, our technique approximates gradients through Differential Evolution and uses approximated gradients to construct adversarial samples. Experimental results show that our technique can achieve 100% success in generating adversarial samples to trigger misclassification, and over 95% success in generating samples to trigger misclassification to a specific target output label. It also demonstrates better perturbation distance and better transferability. Compared to the state-of-the-art black-box technique, our technique is more efficient. Furthermore, we conduct testing on the commercial Aliyun API and successfully trigger its misbehavior within a limited number of queries, demonstrating the feasibility of real-world black-box attack. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A two-stage frequency-domain generation algorithm based on differential evolution for black-box adversarial samples
    Song, Xianfang
    Xu, Denghui
    Peng, Chao
    Zhang, Yong
    Xue, Yu
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [2] SUBSTITUTE MODEL GENERATION FOR BLACK-BOX ADVERSARIAL ATTACK BASED ON KNOWLEDGE DISTILLATION
    Cui, Weiyu
    Li, Xiaorui
    Huang, Jiawei
    Wang, Wenyi
    Wang, Shuai
    Chen, Jianwen
    2020 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2020, : 648 - 652
  • [3] Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders
    Po-Hao Huang
    Yu, Honggang
    Panoff, Max
    Wang, Ting-Chi
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (03)
  • [4] A Self-Adaptive Approximated-Gradient-Simulation Method for Black-Box Adversarial Sample Generation
    Zhang, Yue
    Shin, Seong-Yoon
    Tan, Xujie
    Xiong, Bin
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [5] Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors
    Tang, Guijian
    Yao, Wen
    Li, Chao
    Jiang, Tingsong
    Yang, Shaowu
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 137
  • [6] Resiliency of SNN on Black-Box Adversarial Attacks
    Paudel, Bijay Raj
    Itani, Aashish
    Tragoudas, Spyros
    20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 799 - 806
  • [7] Black-Box Adversarial Sample Attack for Query-Less Text Classification Models
    Luo, Senlin
    Cheng, Yao
    Wan, Yunwei
    Pan, Limin
    Li, Xinshuai
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2024, 44 (12): : 1277 - 1286
  • [8] An adversarial attack on DNN-based black-box object detectors
    Wang, Yajie
    Tan, Yu-an
    Zhang, Wenjiao
    Zhao, Yuhang
    Kuang, Xiaohui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161
  • [9] Improved Differential Evolution for Large-Scale Black-Box Optimization
    Maucec, Mirjam Sepesy
    Brest, Janez
    Boskovic, Borko
    Kacic, Zdravko
    IEEE ACCESS, 2018, 6 : 29516 - 29531
  • [10] Black-box adversarial transferability: An empirical study in cybersecurity perspective
    Roshan, Khushnaseeb
    Zafar, Aasim
    COMPUTERS & SECURITY, 2024, 141