Space-Constrained Random Sparse Adversarial Attack

被引:0
|
作者
Qin, Yueyuan [1 ,2 ]
Hou, Gang [1 ,2 ]
Yu, Tingting [3 ]
Gao, Bing [3 ]
Kong, Weiqiang [1 ,2 ]
Liu, Xiaoshan [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116621, Liaoning, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaonin, Dalian 116621, Liaoning, Peoples R China
[3] Beijing Inst Control Engn, Lab High Confidence Embedded Software Engn Technol, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Black-box attack; Constrained attack space; Adversarial perturbation; Random noise; Sampling optimization;
D O I
10.1016/j.neucom.2025.129436
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversarial attacks aim to deceive deep neural networks (DNNs) by introducing carefully designed perturbations. Traditional black-box methods often produce large-scale perturbations, reducing their practicality in real-world scenarios. Asa result, sparse adversarial attacks emerged to improve invisibility and effectiveness by minimizing the number of disturbed pixels, but a major challenge lies in balancing sparsity with attack success. To address this challenge, we propose a novel Space-Constrained Random Sparse Adversarial Attack (SRSA), which focuses on space most influential to the model's decision-making process. SRSA employs a weighted sampling strategy to dynamically update perturbation scores for each space, prioritizing areas with higher impact. A heuristic search algorithm is then applied to precisely target pixels within the selected space, achieving both sparsity and effectiveness. Experimental results demonstrate that SRSA outperforms state-of-theart black-box sparse adversarial attacks, such as Sparse-RS, SA-MOO, SAPF, and Homotopy Attack, on DNNs trained on ImageNet. Specifically, SRSA reduces the perturbation range and magnitude by approximately 20% compared to baseline methods. Moreover, compared to the optimal query-based black-box attack method, Square Attack, SRSA achieves a higher attack success rate while modifying 30% fewer pixels. These results demonstrate that SRSA enhances attack efficiency and effectiveness by incorporating local information into the perturbation search process.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Space-Constrained Interval Selection
    Emek, Yuval
    Halldorsson, Magnus M.
    Rosen, Adi
    AUTOMATA, LANGUAGES, AND PROGRAMMING, ICALP 2012 PT I, 2012, 7391 : 302 - 313
  • [2] Space-Constrained Interval Selection
    Emek, Yuval
    Halldorsson, Magnus M.
    Rosen, Adi
    ACM TRANSACTIONS ON ALGORITHMS, 2016, 12 (04)
  • [3] Space-Constrained Arrays for Massive MIMO
    Miller, Chelsea L.
    Smith, Peter J.
    Dmochowski, Pawel A.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (05) : 948 - 952
  • [4] SCaRC: Space-constrained resource-constrained scheduling system
    Thabet, WY
    Beliveau, YJ
    JOURNAL OF COMPUTING IN CIVIL ENGINEERING, 1997, 11 (01) : 48 - 59
  • [5] An agile chipper truck for space-constrained operations
    Spinelli, Raffaele
    De Francesco, Fabio
    Eliasson, Lars
    Jessup, Eric
    Magagnotti, Natascia
    BIOMASS & BIOENERGY, 2015, 81 : 137 - 143
  • [6] Reqomp: Space-constrained Uncomputation for Quantum Circuits
    Paradis, Anouk
    Bichsel, Benjamin
    Vechev, Martin
    QUANTUM, 2024, 8
  • [7] Adaptive bitmap indexes for space-constrained systems
    Sinha, Rishi Rakesh
    Winslett, Marianne
    Wu, Kesheng
    Stockinger, Kurt
    Shoshani, Arie
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1418 - +
  • [8] Space-Constrained Mixed-ADC Massive MIMO
    Pirzadeh, Hessam
    Swindlehurst, A. Lee
    Nossek, Josef A.
    2019 IEEE 20TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC 2019), 2019,
  • [9] Space-constrained vector quantization using wavelet transform
    Wuhan Univ of Survey and Mapping, Sciences and Technology, Wuhan, China
    Tien Tzu Hsueh Pao, 4 ([d]12-14, 23):
  • [10] Space-constrained vector quantization using wavelet transform
    Fang, Tao
    Guo, Dazhi
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1998, 26 (04): : 12 - 14