Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries

08/24/2022
by   Dongbin Na, et al.
10

Adversarial examples are inputs intentionally generated for fooling a deep neural network. Recent studies have proposed unrestricted adversarial attacks that are not norm-constrained. However, the previous unrestricted attack methods still have limitations to fool real-world applications in a black-box setting. In this paper, we present a novel method for generating unrestricted adversarial examples using GAN where an attacker can only access the top-1 final decision of a classification model. Our method, Latent-HSJA, efficiently leverages the advantages of a decision-based attack in the latent space and successfully manipulates the latent vectors for fooling the classification model. With extensive experiments, we demonstrate that our proposed method is efficient in evaluating the robustness of classification models with limited queries in a black-box setting. First, we demonstrate that our targeted attack method is query-efficient to produce unrestricted adversarial examples for a facial identity recognition model that contains 307 identities. Then, we demonstrate that the proposed method can also successfully attack a real-world celebrity recognition service.

READ FULL TEXT

page 2

page 9

page 10

page 12

research
04/23/2018

Black-box Adversarial Attacks with Limited Queries and Information

Current neural network-based classifiers are susceptible to adversarial ...
research
03/26/2019

A geometry-inspired decision-based attack

Deep neural networks have recently achieved tremendous success in image ...
research
05/09/2021

Automated Decision-based Adversarial Attacks

Deep learning models are vulnerable to adversarial examples, which can f...
research
04/26/2022

Restricted Black-box Adversarial Attack Against DeepFake Face Swapping

DeepFake face swapping presents a significant threat to online security ...
research
06/07/2023

Extracting Cloud-based Model with Prior Knowledge

Machine Learning-as-a-Service, a pay-as-you-go business pattern, is wide...
research
01/10/2023

Estimation of User's World Model Using Graph2vec

To obtain advanced interaction between autonomous robots and users, robo...
research
12/21/2020

Adjust-free adversarial example generation in speech recognition using evolutionary multi-objective optimization under black-box condition

This paper proposes a black-box adversarial attack method to automatic s...

Please sign up or login with your details

Forgot password? Click here to reset