Residential College | false |
Status | 已發表Published |
DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space | |
Liu, Jun1; Zhou, Jiantao1; Zeng, Jiandian2; Tian, Jinyu3 | |
2024-03-25 | |
Conference Name | 38th AAAI Conference on Artificial Intelligence, AAAI 2024 |
Source Publication | Proceedings of the AAAI Conference on Artificial Intelligence |
Volume | 38 |
Issue | 4 |
Pages | 3666-3674 |
Conference Date | 20 February 2024through 27 February 2024 |
Conference Place | Vancouver |
Country | Canada |
Abstract | This work investigates efficient score-based black-box adversarial attacks with a high Attack Success Rate (ASR) and good generalizability. We design a novel attack method based on a Disentangled Feature space, called DifAttack, which differs significantly from the existing ones operating over the entire feature space. Specifically, DifAttack firstly disentangles an image’s latent feature into an adversarial feature and a visual feature, where the former dominates the adversarial capability of an image, while the latter largely determines its visual appearance. We train an autoencoder for the disentanglement by using pairs of clean images and their Adversarial Examples (AEs) generated from available surrogate models via white-box attack methods. Eventually, DifAttack iteratively optimizes the adversarial feature according to the query feedback from the victim model until a successful AE is generated, while keeping the visual feature unaltered. In addition, due to the avoidance of using surrogate models’ gradient information when optimizing AEs for black-box models, our proposed DifAttack inherently possesses better attack capability in the open-set scenario, where the training dataset of the victim model is unknown. Extensive experimental results demonstrate that our method achieves significant improvements in ASR and query efficiency simultaneously, especially in the targeted attack and open-set scenarios. The code is available at https://github.com/csjunjun/DifAttack.git. |
Keyword | Cv: Adversarial Attacks & Robustness Ml: Adversarial Learning & Robustness |
DOI | 10.1609/aaai.v38i4.28156 |
URL | View the original |
Language | 英語English |
Scopus ID | 2-s2.0-85189504840 |
Fulltext Access | |
Citation statistics | |
Document Type | Conference paper |
Collection | Faculty of Science and Technology THE STATE KEY LABORATORY OF INTERNET OF THINGS FOR SMART CITY (UNIVERSITY OF MACAU) DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE |
Corresponding Author | Zhou, Jiantao |
Affiliation | 1.State Key Laboratory of Internet of Things for Smart City, Department of Computer and Information Science, University of Macau, Macao 2.Institute of Artificial Intelligence and Future Networks, Beijing Normal University, China 3.School of Computer Science and Engineering, Macau University of Science and Technology, Macao |
First Author Affilication | University of Macau |
Corresponding Author Affilication | University of Macau |
Recommended Citation GB/T 7714 | Liu, Jun,Zhou, Jiantao,Zeng, Jiandian,et al. DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space[C], 2024, 3666-3674. |
APA | Liu, Jun., Zhou, Jiantao., Zeng, Jiandian., & Tian, Jinyu (2024). DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space. Proceedings of the AAAI Conference on Artificial Intelligence, 38(4), 3666-3674. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment