Adversarial Examples versus Cloud-based Detectors: A Black-box Empirical Study

01/04/2019
by   Xurong Li, et al.
0

Deep learning has been broadly leveraged by major cloud providers such as Google, AWS, Baidu, to offer various computer vision related services including image auto-classification, object identification and illegal image detection. While many recent works demonstrated that deep learning classification models are vulnerable to adversarial examples, real-world cloud-based image detection services are more complex than classification and there is little literature about adversarial example attacks on detection services. In this paper, we mainly focus on studying the security of real-world cloud-based image detectors. Specifically, (1) based on effective semantic segmentation, we propose four different attacks to generate semantics-aware adversarial examples via only interacting with black-box APIs; and (2) we make the first attempt to conduct an extensive empirical study of black-box attacks against real-world cloud-based image detectors. Through evaluations on five popular cloud platforms including AWS, Azure, Google Cloud, Baidu Cloud and Alibaba Cloud, we demonstrate that our IP attack has a success rate of approximately 100 semantic segmentation based attacks (e.g., SP, SBLS, SBB) have a a success rate over 90 pornography detection. We discuss the possible defenses to address these security challenges in cloud-based detectors.

READ FULL TEXT

page 3

page 5

page 9

page 12

page 13

page 14

page 15

page 18

research
06/19/2019

Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield

Many recent works demonstrated that Deep Learning models are vulnerable ...
research
05/20/2021

Simple Transparent Adversarial Examples

There has been a rise in the use of Machine Learning as a Service (MLaaS...
research
04/05/2022

Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models

Web-based phishing attacks nowadays exploit popular cloud web hosting se...
research
11/22/2019

Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction

Neural networks are known to be vulnerable to carefully crafted adversar...
research
09/17/2019

AdaCompress: Adaptive Compression for Online Computer Vision Services

With the growth of computer vision based applications and services, an e...
research
06/12/2023

When Vision Fails: Text Attacks Against ViT and OCR

While text-based machine learning models that operate on visual inputs o...
research
06/08/2023

A Melting Pot of Evolution and Learning

We survey eight recent works by our group, involving the successful blen...

Please sign up or login with your details

Forgot password? Click here to reset