Fast Gradient Scaled Method for Generating Adversarial Examples

被引:0
|
作者
Xu, Zhefeng [1 ]
Luo, Zhijian [1 ]
Mu, Jinlong [1 ]
机构
[1] Hunan Inst Traff Engn, Hengyang, Hunan, Peoples R China
来源
6TH INTERNATIONAL CONFERENCE ON INNOVATION IN ARTIFICIAL INTELLIGENCE, ICIAI2022 | 2022年
关键词
adversarial examples; FGSM; FGScaledM; adversarial perturbations;
D O I
10.1145/3529466.3529497
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Though deep neural networks have achieved great success on many challenging tasks, they are demonstrated to be vulnerable to adversarial examples, which fool neural networks by adding human-imperceptible perturbations to the clean examples. As the first generation attack for generating adversarial examples, FGSM has inspired many follow-up attacks. However, the adversarial perturbations generated by FGSM are usually human-perceptible because FGSM modifies the pixels by the same amplitude through computing the sign of the gradients of the loss. To this end, we propose the fast gradient scaled method (FGScaledM), which scales the gradients of the loss to the valid range and can make adversarial perturbation to be more human-imperceptible. Extensive experiments on MNIST and CIFAR-10 datasets show that while maintaining similar attack success rates, our proposed FGScaledM can generate more fine-grained and more human-imperceptible adversarial perturbations than FGSM.
引用
收藏
页码:189 / 193
页数:5
相关论文
共 50 条
  • [31] Generating adversarial examples for DNN using pooling layers
    Zhang, Yueling
    Pu, Geguang
    Zhang, Min
    Yang, William
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (04) : 4615 - 4620
  • [32] On the Strengths of Pure Evolutionary Algorithms in Generating Adversarial Examples
    Bartlett, Antony
    Liem, Cynthia C. S.
    Panichella, Annibale
    2023 IEEE/ACM INTERNATIONAL WORKSHOP ON SEARCH-BASED AND FUZZ TESTING, SBFT, 2023, : 1 - 8
  • [33] Generating Fluent Chinese Adversarial Examples for Sentiment Classification
    Wang, Congyi
    Zeng, Jianping
    Wu, Chengrong
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2020, : 149 - +
  • [34] Marginal Attacks of Generating Adversarial Examples for Spam Filtering
    Zhaoquan, Gu
    Yushun, Xie
    Weixiong, Hu
    Lihua, Yin
    Yi, Han
    Zhihong, Tian
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 595 - 602
  • [35] Generating unrestricted adversarial examples via three parameteres
    Hanieh Naderi
    Leili Goli
    Shohreh Kasaei
    Multimedia Tools and Applications, 2022, 81 : 21919 - 21938
  • [36] Generating Transferable Adversarial Examples against Vision Transformers
    Wang, Yuxuan
    Wang, Jiakai
    Yin, Zinxin
    Gong, Ruihao
    Wang, Jingyi
    Liu, Aishan
    Liu, Xianglong
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022, : 5181 - 5190
  • [37] Generating unrestricted adversarial examples via three parameteres
    Naderi, Hanieh
    Goli, Leili
    Kasaei, Shohreh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (15) : 21919 - 21938
  • [38] Generating Adversarial Examples with Image-To-Perturbation Network
    Wang, Desheng
    Jin, Weidong
    Wu, Yunpu
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7055 - 7060
  • [39] Common knowledge learning for generating transferable adversarial examples
    Yang, Ruijie
    Guo, Yuanfang
    Wang, Junfu
    Zhou, Jiantao
    Wang, Yunhong
    FRONTIERS OF COMPUTER SCIENCE, 2025, 19 (10)
  • [40] Marginal Attacks of Generating Adversarial Examples for Spam Filtering
    GU Zhaoquan
    XIE Yushun
    HU Weixiong
    YIN Lihua
    HAN Yi
    TIAN Zhihong
    Chinese Journal of Electronics, 2021, 30 (04) : 595 - 602