ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space

被引:2
|
作者
Wang, Haobo [1 ]
Zhu, Chenxi [1 ]
Cao, Yangjie [1 ]
Zhuang, Yan [1 ]
Li, Jie [2 ]
Chen, Xianfu [3 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450000, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200000, Peoples R China
[3] VTT Tech Res Ctr Finland, Oulu 90100, Finland
基金
中国国家自然科学基金;
关键词
edge-detection algorithm; latent space; adversarial distribution searching; adversarial attack;
D O I
10.3390/electronics12040816
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks are susceptible to interference from deliberately crafted noise, which can lead to incorrect classification results. Existing approaches make less use of latent space information and conduct pixel-domain modification in the input space instead, which increases the computational cost and decreases the transferability. In this work, we propose an effective adversarial distribution searching-driven attack (ADSAttack) algorithm to generate adversarial examples against deep neural networks. ADSAttack introduces an affiliated network to search for potential distributions in image latent space for synthesizing adversarial examples. ADSAttack uses an edge-detection algorithm to locate low-level feature mapping in input space to sketch the minimum effective disturbed area. Experimental results demonstrate that ADSAttack achieves higher transferability, better imperceptible visualization, and faster generation speed compared to traditional algorithms. To generate 1000 adversarial examples, ADSAttack takes 11.08s and, on average, achieves a success rate of 98.01%.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] ClusterGAN: Latent Space Clustering in Generative Adversarial Networks
    Mukherjee, Sudipto
    Asnani, Himanshu
    Lin, Eugene
    Kannan, Sreeram
    THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 4610 - 4617
  • [32] Toward feature space adversarial attack in the frequency domain
    Wang, Yajie
    Tan, Yu-an
    Lyu, Haoran
    Wu, Shangbo
    Zhao, Yuhang
    Li, Yuanzhang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 11019 - 11036
  • [33] Angle Space Adversarial Attack on Skeletal Action Recognition
    Cao, Nan
    Diao, Yunfeng
    Huang, Yinqin
    Du, Run
    Li, Huaixian
    Cheng, Tianjian
    Computer Engineering and Applications, 2023, 59 (14) : 260 - 267
  • [34] RayS: A Ray Searching Method for Hard-label Adversarial Attack
    Chen, Jinghui
    Gu, Quanquan
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 1739 - 1747
  • [35] A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space
    Li, Lyue
    Rezapour, Amir
    Tzeng, Wen-Guey
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [36] Adversarial Attack Algorithm for Introducing Degree Centrality Selection of Attack Nodes
    Qian, Rong
    Xu, Xuefei
    Liu, Xiaoyu
    Zhang, Kejun
    Zeng, Junming
    Lyu, Zongfang
    Guo, Jinghui
    Computer Engineering and Applications, 2024, 60 (18) : 285 - 293
  • [37] Defending Physical Adversarial Attack on Object Detection via Adversarial Patch-Feature Energy
    Kim, Taeheon
    Yu, Youngjoon
    Ro, Yong Man
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 1905 - 1913
  • [38] Spectral adversarial attack on graph via node injection
    Ou, Weihua
    Yao, Yi
    Xiong, Jiahao
    Wu, Yunshun
    Deng, Xianjun
    Gou, Jianping
    Chen, Jiamin
    JOURNAL OF ENVIRONMENTAL CHEMICAL ENGINEERING, 2025, 13 (01):
  • [39] Boosting Adversarial Transferability via Gradient Relevance Attack
    Zhu, Hegui
    Ren, Yuchen
    Sui, Xiaoyan
    Yang, Lianping
    Jiang, Wuming
    2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION, ICCV, 2023, : 4718 - 4727
  • [40] Detection of Iterative Adversarial Attacks via Counter Attack
    Rottmann, Matthias
    Maag, Kira
    Peyron, Mathis
    Gottschalk, Hanno
    Krejic, Natasa
    JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS, 2023, 198 (03) : 892 - 929