基于查询和扰动分布的改进黑盒攻击

Weiwei Zhao, Z. Zeng
{"title":"基于查询和扰动分布的改进黑盒攻击","authors":"Weiwei Zhao, Z. Zeng","doi":"10.1109/ICACI52617.2021.9435907","DOIUrl":null,"url":null,"abstract":"Adversarial examples cause the deep neural network prediction error, which is a great threat to the deep neural network. How to generate more natural adversarial examples and improve the robustness of deep neural networks has received attention. In this paper, we propose an improved blackbox attack (IBBA) algorithm based on query and perturbation distribution. This algorithm only needs the top-l label of the attacked model to generate the adversarial examples. Based on the existing black-box attacks, we optimize the performance of the algorithm from two aspects: query distribution and perturbation distribution. In the aspect of query distribution, we adopt different strategies for nontargeted attack and targeted attack; in the aspect of perturbation distribution, we choose different low-frequency noise according to the difference between the targeted attack and nontargeted attack. The experimental results on ImageNet show that the proposed algorithm is better than the existing algorithms in low query number, and the targeted attack is better in each specified query number.","PeriodicalId":382483,"journal":{"name":"2021 13th International Conference on Advanced Computational Intelligence (ICACI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Improved black-box attack based on query and perturbation distribution\",\"authors\":\"Weiwei Zhao, Z. Zeng\",\"doi\":\"10.1109/ICACI52617.2021.9435907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Adversarial examples cause the deep neural network prediction error, which is a great threat to the deep neural network. How to generate more natural adversarial examples and improve the robustness of deep neural networks has received attention. In this paper, we propose an improved blackbox attack (IBBA) algorithm based on query and perturbation distribution. This algorithm only needs the top-l label of the attacked model to generate the adversarial examples. Based on the existing black-box attacks, we optimize the performance of the algorithm from two aspects: query distribution and perturbation distribution. In the aspect of query distribution, we adopt different strategies for nontargeted attack and targeted attack; in the aspect of perturbation distribution, we choose different low-frequency noise according to the difference between the targeted attack and nontargeted attack. The experimental results on ImageNet show that the proposed algorithm is better than the existing algorithms in low query number, and the targeted attack is better in each specified query number.\",\"PeriodicalId\":382483,\"journal\":{\"name\":\"2021 13th International Conference on Advanced Computational Intelligence (ICACI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 13th International Conference on Advanced Computational Intelligence (ICACI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACI52617.2021.9435907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 13th International Conference on Advanced Computational Intelligence (ICACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACI52617.2021.9435907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

对抗样例会导致深度神经网络的预测误差,这对深度神经网络是一个很大的威胁。如何生成更自然的对抗样例并提高深度神经网络的鲁棒性一直是人们关注的问题。本文提出了一种改进的基于查询和摄动分布的黑盒攻击算法。该算法只需要被攻击模型的top- 1标签就可以生成对抗性样本。在现有黑盒攻击的基础上,从查询分布和扰动分布两方面对算法性能进行优化。在查询分布方面,针对非针对性攻击和针对性攻击采用了不同的策略;在摄动分布方面,我们根据目标攻击和非目标攻击的不同选择不同的低频噪声。在ImageNet上的实验结果表明,该算法在低查询数条件下优于现有算法,在每个指定的查询数条件下具有更好的针对性攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Improved black-box attack based on query and perturbation distribution
Adversarial examples cause the deep neural network prediction error, which is a great threat to the deep neural network. How to generate more natural adversarial examples and improve the robustness of deep neural networks has received attention. In this paper, we propose an improved blackbox attack (IBBA) algorithm based on query and perturbation distribution. This algorithm only needs the top-l label of the attacked model to generate the adversarial examples. Based on the existing black-box attacks, we optimize the performance of the algorithm from two aspects: query distribution and perturbation distribution. In the aspect of query distribution, we adopt different strategies for nontargeted attack and targeted attack; in the aspect of perturbation distribution, we choose different low-frequency noise according to the difference between the targeted attack and nontargeted attack. The experimental results on ImageNet show that the proposed algorithm is better than the existing algorithms in low query number, and the targeted attack is better in each specified query number.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Visual saliency detection based on visual center shift MMTrans-MT: A Framework for Multimodal Emotion Recognition Using Multitask Learning K-means Clustering Based on Improved Quantum Particle Swarm Optimization Algorithm Performance of different Electric vehicle Battery packs at low temperature and Analysis of Intelligent SOC experiment Service Quality Loss-aware Privacy Protection Mechanism in Edge-Cloud IoTs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1