How to choose your best allies for a transferable attack?

04/05/2023
by   Thibault Maho, et al.
0

The transferability of adversarial examples is a key issue in the security of deep neural networks. The possibility of an adversarial example crafted for a source model fooling another targeted model makes the threat of adversarial attacks more realistic. Measuring transferability is a crucial problem, but the Attack Success Rate alone does not provide a sound evaluation. This paper proposes a new methodology for evaluating transferability by putting distortion in a central position. This new tool shows that transferable attacks may perform far worse than a black box attack if the attacker randomly picks the source model. To address this issue, we propose a new selection mechanism, called FiT, which aims at choosing the best source model with only a few preliminary queries to the target. Our experimental results show that FiT is highly effective at selecting the best source model for multiple scenarios such as single-model attacks, ensemble-model attacks and multiple attacks (Code available at: https://github.com/t-maho/transferability_measure_fit).

READ FULL TEXT

page 4

page 5

page 8

page 12

research
11/02/2022

Improving transferability of 3D adversarial attacks with scale and shear transformations

Previous work has shown that 3D point cloud classifiers can be vulnerabl...
research
05/31/2021

Transferable Sparse Adversarial Attack

Deep neural networks have shown their vulnerability to adversarial attac...
research
07/08/2022

Defense Against Multi-target Trojan Attacks

Adversarial attacks on deep learning-based models pose a significant thr...
research
07/29/2021

Feature Importance-aware Transferable Adversarial Attacks

Transferability of adversarial examples is of central importance for att...
research
05/26/2022

Transferable Adversarial Attack based on Integrated Gradients

The vulnerability of deep neural networks to adversarial examples has dr...
research
05/12/2020

Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks

Transferability of adversarial examples is a key issue to study the secu...
research
03/26/2021

On Generating Transferable Targeted Perturbations

While the untargeted black-box transferability of adversarial perturbati...

Please sign up or login with your details

Forgot password? Click here to reset