ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space

被引:2
|
作者
Wang, Haobo [1 ]
Zhu, Chenxi [1 ]
Cao, Yangjie [1 ]
Zhuang, Yan [1 ]
Li, Jie [2 ]
Chen, Xianfu [3 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450000, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200000, Peoples R China
[3] VTT Tech Res Ctr Finland, Oulu 90100, Finland
基金
中国国家自然科学基金;
关键词
edge-detection algorithm; latent space; adversarial distribution searching; adversarial attack;
D O I
10.3390/electronics12040816
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks are susceptible to interference from deliberately crafted noise, which can lead to incorrect classification results. Existing approaches make less use of latent space information and conduct pixel-domain modification in the input space instead, which increases the computational cost and decreases the transferability. In this work, we propose an effective adversarial distribution searching-driven attack (ADSAttack) algorithm to generate adversarial examples against deep neural networks. ADSAttack introduces an affiliated network to search for potential distributions in image latent space for synthesizing adversarial examples. ADSAttack uses an edge-detection algorithm to locate low-level feature mapping in input space to sketch the minimum effective disturbed area. Experimental results demonstrate that ADSAttack achieves higher transferability, better imperceptible visualization, and faster generation speed compared to traditional algorithms. To generate 1000 adversarial examples, ADSAttack takes 11.08s and, on average, achieves a success rate of 98.01%.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Artistic image adversarial attack via style perturbation
    Zhang, Haiyan
    Wang, Quan
    Feng, Guorui
    MULTIMEDIA SYSTEMS, 2023, 29 (06) : 3745 - 3755
  • [42] Search the Steganographic Policy for Image via Adversarial Attack
    Li L.
    Fan M.
    Hao J.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2022, 51 (02): : 259 - 263
  • [43] Artistic image adversarial attack via style perturbation
    Haiyan Zhang
    Quan Wang
    Guorui Feng
    Multimedia Systems, 2023, 29 (6) : 3745 - 3755
  • [44] Detection of Iterative Adversarial Attacks via Counter Attack
    Matthias Rottmann
    Kira Maag
    Mathis Peyron
    Hanno Gottschalk
    Nataša Krejić
    Journal of Optimization Theory and Applications, 2023, 198 : 892 - 929
  • [45] Imperceptible Adversarial Attack via Invertible Neural Networks
    Chen, Zihan
    Wang, Ziyue
    Huang, Jun-Jie
    Zhao, Wentao
    Liu, Xiao
    Guan, Dejian
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 1, 2023, : 414 - 424
  • [46] UNTARGETED ADVERSARIAL ATTACK VIA EXPANDING THE SEMANTIC GAP
    Wu, Aming
    Han, Yahong
    Zhang, Quanxin
    Kuang, Xiaohui
    2019 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2019, : 514 - 519
  • [47] Universal Physical Adversarial Attack via Background Image
    Xu, Yidan
    Wang, Juan
    Li, Yuanzhang
    Wang, Yajie
    Xu, Zixuan
    Wang, Dianxin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 3 - 14
  • [48] Space-Time Gradient Iterative Voiceprint Adversarial Attack Algorithm STI-FGSM
    Li, Shuo
    Gu, Yijun
    Tan, Hao
    Computer Engineering and Applications, 2023, 59 (21) : 151 - 158
  • [49] Cross-Scene Classification of Hyperspectral Images via Generative Adversarial Network in Latent Space
    Yang, Yahan
    Xu, Yang
    Wu, Zebin
    Wang, Biqi
    Wei, Zhihui
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2023, 61
  • [50] Mainshock-aftershock sequence simulation via latent space encoding of generative adversarial networks
    Xu, Zekun
    Shen, Jiaxu
    Wu, Huayong
    Chen, Jun
    COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2025, 40 (04) : 464 - 482