Author:
Xie Pengfei,Shi Shuhao,Yang Shuai,Qiao Kai,Liang Ningning,Wang Linyuan,Chen Jian,Hu Guoen,Yan Bin
Abstract
Deep neural networks (DNNs) are proven vulnerable to attack against adversarial examples. Black-box transfer attacks pose a massive threat to AI applications without accessing target models. At present, the most effective black-box attack methods mainly adopt data enhancement methods, such as input transformation. Previous data enhancement frameworks only work on input transformations that satisfy accuracy or loss invariance. However, it does not work for other transformations that do not meet the above conditions, such as the transformation which will lose information. To solve this problem, we propose a new noise data enhancement framework (NDEF), which only transforms adversarial perturbation to avoid the above issues effectively. In addition, we introduce random erasing under this framework to prevent the over-fitting of adversarial examples. Experimental results show that the black-box attack success rate of our method Random Erasing Iterative Fast Gradient Sign Method (REI-FGSM) is 4.2% higher than DI-FGSM in six models on average and 6.6% higher than DI-FGSM in three defense models. REI-FGSM can combine with other methods to achieve excellent performance. The attack performance of SI-FGSM can be improved by 22.9% on average when combined with REI-FGSM. Besides, our combined version with DI-TI-MI-FGSM, i.e., DI-TI-MI-REI-FGSM can achieve an average attack success rate of 97.0% against three ensemble adversarial training models, which is greater than the current gradient iterative attack method. We also introduce Gaussian blur to prove the compatibility of our framework.
Subject
Artificial Intelligence,Biomedical Engineering
Reference44 articles.
1. Vulnerability of deep reinforcement learning to policy induction attacks,;Behzadan,2017
2. Yolov4: Optimal speed and accuracy of object detection;Bochkovskiy;arXiv [Preprint] arXiv:2004.10934.,2020
3. End to end learning for self-driving cars;Bojarski;arXiv [Preprint] arXiv:1604.07316,2016
4. Towards evaluating the robustness of neural networks;Carlini;arXiv [Preprint] arXiv: 1608.04644,2017
5. Audio adversarial examples: Targeted attacks on speech-to-text,;Carlini,2018
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献