Improving query efficiency of black-box attacks via the preference of models

被引:1
|
作者
Yang, Xiangyuan [1 ]
Lin, Jie [1 ]
Zhang, Hanlin [2 ]
Zhao, Peng [1 ]
机构
[1] Xi'an Jiaotong Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[2] Qingdao Univ, Qingdao, Peoples R China
关键词
Black-box query attack; Gradient-aligned attack; Preference property; Gradient preference; ROBUSTNESS;
D O I
10.1016/j.ins.2024.121013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Black-box query attacks are effective at compromising deep-learning models using only the model's output. These attacks typically face challenges with low attack success rates (ASRs) when limited to fewer than ten queries per example. Recent approaches have improved ASRs due to the transferability of initial perturbations, yet they still suffer from inefficient querying. Our study introduces the Gradient-Aligned Attack (GAA) to enhance ASRs with minimal perturbation by focusing on the model's preference. We define a preference property where the generated adversarial example prefers to be misclassified as the wrong category with a high initial confidence. This property is further elucidated by the gradient preference, suggesting a positive correlation between the magnitude of a coefficient in a partial derivative and the norm of the derivative itself. Utilizing this, we devise the gradient-aligned CE (GACE) loss to precisely estimate gradients by aligning these coefficients between the surrogate and victim models, with coefficients assessed by the victim model's outputs. GAA, based on the GACE loss, also aims to achieve the smallest perturbation. Our tests on ImageNet, CIFAR10, and Imagga API show that GAA can increase ASRs by 25.7% and 40.3% for untargeted and targeted attacks respectively, while only needing minimally disruptive perturbations. Furthermore, the GACE loss reduces the number of necessary queries by up to 2.5x and enhances the transferability of advanced attacks by up to 14.2%, especially when using an ensemble surrogate model. Code is available at https:// github .com /HaloMoto /GradientAlignedAttack.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Simulating Unknown Target Models for Query-Efficient Black-box Attacks
    Ma, Chen
    Chen, Li
    Yong, Jun-Hai
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 11830 - 11839
  • [2] Query-based Local Black-box Adversarial Attacks
    Shi, Jing
    Zhang, Xiaolin
    Xu, Enhui
    Wang, Yongping
    Zhang, Wenwen
    International Journal of Network Security, 2023, 25 (06) : 1048 - 1058
  • [3] Black-box Adversarial Attacks on Video Recognition Models
    Jiang, Linxi
    Ma, Xingjun
    Chen, Shaoxiang
    Bailey, James
    Jiang, Yu-Gang
    PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19), 2019, : 864 - 872
  • [4] Query-efficient label-only attacks against black-box machine learning models
    Ren, Yizhi
    Zhou, Qi
    Wang, Zhen
    Wu, Ting
    Wu, Guohua
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2020, 90
  • [5] Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition
    Tong, Chuxuan
    Zheng, Xi
    Li, Jianhua
    Ma, Xingjun
    Gao, Longxiang
    Xiang, Yong
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 : 3981 - 3992
  • [6] QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
    Li, Xiaodan
    Li, Jinfeng
    Chen, Yuefeng
    Ye, Shaokai
    He, Yuan
    Wang, Shuhui
    Su, Hang
    Xue, Hui
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 3329 - 3338
  • [7] Random transformations to improve mitigation of query-based black-box attacks
    Ali, Ziad Tariq Muhammad
    Azad, R. Muhammad Atif
    Azad, Muhammad Ajmal
    Holyhead, James
    Rice, Iain
    Imran, Ali Shariq
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 264
  • [8] MalDBA: Detection for Query-Based Malware Black-Box Adversarial Attacks
    Kong, Zixiao
    Xue, Jingfeng
    Liu, Zhenyan
    Wang, Yong
    Han, Weijie
    ELECTRONICS, 2023, 12 (07)
  • [9] Partial Retraining Substitute Model for Query-Limited Black-Box Attacks
    Park, Hosung
    Ryu, Gwonsang
    Choi, Daeseon
    APPLIED SCIENCES-BASEL, 2020, 10 (20): : 1 - 19
  • [10] Towards Query Efficient Black-box Attacks: An Input-free Perspective
    Du, Yali
    Fang, Meng
    Yi, Jinfeng
    Cheng, Jun
    Tao, Dacheng
    AISEC'18: PROCEEDINGS OF THE 11TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2018, : 13 - 24