Efficient Local Imperceptible Random Search for Black-Box Adversarial Attacks

被引:0
|
作者
Li, Yining [1 ]
You, Shu [1 ]
Chen, Yihan [1 ]
Li, Zhenhua [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Sch Comp Sci & Technol, MIIT Key Lab Pattern Anal & Machine Intelligence, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Black-box attack; Imperceptible perturbation; Salient region; High-quality; Local Imperceptible Random Search Approach;
D O I
10.1007/978-981-97-5612-4_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial attacks involve making subtle perturbations to input images, which cause the DNN model to output incorrect predictions. Most existing black-box attacks fool the target model by querying the target model to generate global perturbation, which requires many queries and makes the perturbation easily detectable. We propose a local black-box attack algorithm based on salient region localization called Local Imperceptible Random Search (LIRS). This method combines the precise localization of sensitive regions with a random search algorithm to generate a universal framework for local perturbation, which is compatible with most black-box attack algorithms. We conducted comprehensive experiments and found that it efficiently generates adversarial examples with subtle perturbations under limited queries. Additionally, it can effectively identify perturbation-sensitive regions in images, outperforming existing state-of-the-art black-box attack methods.
引用
收藏
页码:325 / 336
页数:12
相关论文
共 50 条
  • [31] Simple Black-Box Adversarial Attacks on Deep Neural Networks
    Narodytska, Nina
    Kasiviswanathan, Shiva
    2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, : 1310 - 1318
  • [32] Heuristic Black-Box Adversarial Attacks on Video Recognition Models
    Wei, Zhipeng
    Chen, Jingjing
    Wei, Xingxing
    Jiang, Linxi
    Chua, Tat-Seng
    Zhou, Fengfeng
    Jiang, Yu-Gang
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 12338 - 12345
  • [33] Sensitive region-aware black-box adversarial attacks
    Lin, Chenhao
    Han, Sicong
    Zhu, Jiongli
    Li, Qian
    Shen, Chao
    Zhang, Youwei
    Guan, Xiaohong
    INFORMATION SCIENCES, 2023, 637
  • [34] Adaptive Temporal Grouping for Black-box Adversarial Attacks on Videos
    Wei, Zhipeng
    Chen, Jingjing
    Zhang, Hao
    Jiang, Linxi
    Jiang, Yu-Gang
    PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL, ICMR 2022, 2022, : 587 - 593
  • [35] Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes
    Shukla, Satya Narayan
    Sahu, Anit Kumar
    Willmott, Devin
    Kolter, Zico
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1461 - 1469
  • [36] Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems
    Wang, Fangwei
    Song, Ruixin
    Li, Qingru
    Wang, Changguang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT V, 2024, 14491 : 257 - 276
  • [37] Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior
    Dong, Yinpeng
    Cheng, Shuyu
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (12) : 9536 - 9548
  • [38] Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement Analysis
    Wang, Rui
    2022 PROGNOSTICS AND HEALTH MANAGEMENT CONFERENCE, PHM-LONDON 2022, 2022, : 298 - 302
  • [39] Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models
    Cui, Xiaoshu
    Wu, Yalun
    Gu, Yanfeng
    Li, Qiong
    Tong, Endong
    Liu, Jiqiang
    Niu, Wenjia
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT III, KSEM 2024, 2024, 14886 : 220 - 232
  • [40] Semantics aware adversarial malware examples generation for black-box attacks
    Peng, Xiaowei
    Xian, Hequn
    Lu, Qian
    Lu, Xiuqing
    APPLIED SOFT COMPUTING, 2021, 109