Online Adversarial Attacks

03/02/2021
by   Andjela Mladenovic, et al.
0

Adversarial attacks expose important vulnerabilities of deep learning models, yet little attention has been paid to settings where data arrives as a stream. In this paper, we formalize the online adversarial attack problem, emphasizing two key elements found in real-world use-cases: attackers must operate under partial knowledge of the target model, and the decisions made by the attacker are irrevocable since they operate on a transient data stream. We first rigorously analyze a deterministic variant of the online threat model by drawing parallels to the well-studied k-secretary problem and propose , a simple yet practical algorithm yielding a provably better competitive ratio for k=2 over the current best single threshold algorithm. We also introduce the stochastic k-secretary – effectively reducing online blackbox attacks to a k-secretary problem under noise – and prove theoretical bounds on the competitive ratios of any online algorithms adapted to this setting. Finally, we complement our theoretical results by conducting a systematic suite of experiments on MNIST and CIFAR-10 with both vanilla and robust classifiers, revealing that, by leveraging online secretary algorithms, like , we can get an online attack success rate close to the one achieved by the optimal offline solution.

READ FULL TEXT

page 8

page 9

research
01/05/2022

ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

Advances in deep learning have enabled a wide range of promising applica...
research
11/07/2022

Deviations in Representations Induced by Adversarial Attacks

Deep learning has been a popular topic and has achieved success in many ...
research
05/18/2023

Attacks on Online Learners: a Teacher-Student Analysis

Machine learning models are famously vulnerable to adversarial attacks: ...
research
05/30/2023

Adversarial Attacks on Online Learning to Rank with Stochastic Click Models

We propose the first study of adversarial attacks on online learning to ...
research
09/20/2022

Understanding Real-world Threats to Deep Learning Models in Android Apps

Famous for its superior performance, deep learning (DL) has been popular...
research
09/23/2021

Adversarial Transfer Attacks With Unknown Data and Class Overlap

The ability to transfer adversarial attacks from one model (the surrogat...

Please sign up or login with your details

Forgot password? Click here to reset