Simple Black-box Adversarial Attacks

05/17/2019
by   Chuan Guo, et al.
7

We propose an intriguingly simple method for the construction of adversarial images in the black-box setting. In constrast to the white-box scenario, constructing black-box adversarial images has the additional constraint on query budget, and efficient attacks remain an open problem to date. With only the mild assumption of continuous-valued confidence scores, our highly query-efficient algorithm utilizes the following simple iterative principle: we randomly sample a vector from a predefined orthonormal basis and either add or subtract it to the target image. Despite its simplicity, the proposed method can be used for both untargeted and targeted attacks -- resulting in previously unprecedented query efficiency in both settings. We demonstrate the efficacy and efficiency of our algorithm on several real world settings including the Google Cloud Vision API. We argue that our proposed algorithm should serve as a strong baseline for future black-box attacks, in particular because it is extremely fast and its implementation requires less than 20 lines of PyTorch code.

READ FULL TEXT

page 7

page 8

research
07/12/2021

EvoBA: An Evolution Strategy as a Strong Baseline forBlack-Box Adversarial Attacks

Recent work has shown how easily white-box adversarial attacks can be ap...
research
09/15/2020

Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks

We propose a simple and highly query-efficient black-box adversarial att...
research
09/30/2019

Black-box Adversarial Attacks with Bayesian Optimization

We focus on the problem of black-box adversarial attacks, where the aim ...
research
06/08/2019

Making targeted black-box evasion attacks effective and efficient

We investigate how an adversary can optimally use its query budget for t...
research
12/30/2021

Retrieving Black-box Optimal Images from External Databases

Suppose we have a black-box function (e.g., deep neural network) that ta...
research
04/27/2023

Network Cascade Vulnerability using Constrained Bayesian Optimization

Measures of power grid vulnerability are often assessed by the amount of...
research
09/24/2018

Low Frequency Adversarial Perturbation

Recently, machine learning security has received significant attention. ...

Please sign up or login with your details

Forgot password? Click here to reset