Skip to main content

2024 | OriginalPaper | Buchkapitel

SASBO: Sparse Attack via Stochastic Binary Optimization

verfasst von : Yihan Meng, Weitao Li, Lin Shang

Erschienen in: Advances in Knowledge Discovery and Data Mining

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Deep Neural Networks have shown vulnerability to sparse adversarial attack, which involves perturbing only a limited number of pixels. Identifying the coordinates requiring perturbation in sparse attacks poses a significant computational challenge. Existing solutions predominantly rely on heuristic methods or relax the \(\ell _{0}\)-norm to the \(\ell _{1}\)-norm. In this paper, we present an efficient algorithm for conducting sparse attacks. Our algorithm factorizes the perturbation at each pixel to the product of the perturbation coordinates and the perturbation magnitudes and then optimizes them alternately. We reformulate the \(\ell _{0}\)-norm as a stochastic binary optimization problem, assuming that each pixel’s perturbation status is associated with a stochastic binary variable. This stochastic binary variable follows a Bernoulli distribution, with a parameter value that ranges from 0 to 1, signifying the probability of pixel disturbance. To tackle this stochastic binary optimization challenge, we employ an unbiased gradient estimator known as Augment-Reinforce-Merge (ARM). Once the perturbed coordinates are determined, we optimize the perturbation magnitudes with gradient descent. Furthermore, we incorporate a binary search algorithm to eliminate redundant pixels to enhance sparsity. Comprehensive experiments demonstrate the superiority of our proposed method over several state-of-the-art sparse attack methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: SP, pp. 39–57. IEEE (2017) Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: SP, pp. 39–57. IEEE (2017)
3.
Zurück zum Zitat Croce, F., Hein, M.: Sparse and imperceivable adversarial attacks. In: ICCV, pp. 4723–4731. IEEE (2019) Croce, F., Hein, M.: Sparse and imperceivable adversarial attacks. In: ICCV, pp. 4723–4731. IEEE (2019)
4.
Zurück zum Zitat Croce, F., Hein, M.: Mind the box: l\({}_{\text{1}}\)-APGD for sparse adversarial attacks on image classifiers. In: ICML, pp. 2201–2211. PMLR (2021) Croce, F., Hein, M.: Mind the box: l\({}_{\text{1}}\)-APGD for sparse adversarial attacks on image classifiers. In: ICML, pp. 2201–2211. PMLR (2021)
5.
Zurück zum Zitat Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR, pp. 248–255. IEEE (2009) Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR, pp. 248–255. IEEE (2009)
6.
Zurück zum Zitat Dong, X., et al.: GreedyFool: distortion-aware sparse adversarial attack. In: NeurIPS, pp. 11226–11236 (2020) Dong, X., et al.: GreedyFool: distortion-aware sparse adversarial attack. In: NeurIPS, pp. 11226–11236 (2020)
8.
Zurück zum Zitat Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015) Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015)
10.
Zurück zum Zitat He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770–778. IEEE (2016) He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770–778. IEEE (2016)
11.
Zurück zum Zitat Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images. In: Handbook of Systemic Autoimmune Diseases (2009) Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images. In: Handbook of Systemic Autoimmune Diseases (2009)
12.
Zurück zum Zitat Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. In: ICLR (2017) Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. In: ICLR (2017)
13.
Zurück zum Zitat Lin, M., Chen, Q., Yan, S.: Network in network. In: ICLR (2014) Lin, M., Chen, Q., Yan, S.: Network in network. In: ICLR (2014)
14.
Zurück zum Zitat Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (2018) Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (2018)
15.
Zurück zum Zitat Modas, A., Moosavi-Dezfooli, S.M., Frossard, P.: SparseFool: a few pixels make a big difference. In: CVPR, pp. 9087–9096. IEEE (2019) Modas, A., Moosavi-Dezfooli, S.M., Frossard, P.: SparseFool: a few pixels make a big difference. In: CVPR, pp. 9087–9096. IEEE (2019)
16.
Zurück zum Zitat Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: EuroSP, pp. 372–387 (2016) Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: EuroSP, pp. 372–387 (2016)
17.
Zurück zum Zitat Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR (2015) Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR (2015)
18.
Zurück zum Zitat Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. TEVC (2019) Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. TEVC (2019)
19.
Zurück zum Zitat Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014) Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014)
20.
Zurück zum Zitat Yang, H., Ciftci, U.A., Yin, L.: Facial expression recognition by de-expression residue learning. In: CVPR, pp. 2168–2177. IEEE (2018) Yang, H., Ciftci, U.A., Yin, L.: Facial expression recognition by de-expression residue learning. In: CVPR, pp. 2168–2177. IEEE (2018)
21.
Zurück zum Zitat Yin, M., Zhou, M.: ARM: augment-reinforce-merge gradient for stochastic binary networks. In: ICLR (2019) Yin, M., Zhou, M.: ARM: augment-reinforce-merge gradient for stochastic binary networks. In: ICLR (2019)
22.
Zurück zum Zitat Zhao, P., Liu, S., Wang, Y., Lin, X.: An ADMM-based universal framework for adversarial attacks on deep neural networks. In: ACM MM. ACM (2018) Zhao, P., Liu, S., Wang, Y., Lin, X.: An ADMM-based universal framework for adversarial attacks on deep neural networks. In: ACM MM. ACM (2018)
23.
Zurück zum Zitat Zhu, M., Chen, T., Wang, Z.: Sparse and imperceptible adversarial attack via a homotopy algorithm. In: ICML, pp. 12868–12877. PMLR (2021) Zhu, M., Chen, T., Wang, Z.: Sparse and imperceptible adversarial attack via a homotopy algorithm. In: ICML, pp. 12868–12877. PMLR (2021)
24.
Zurück zum Zitat Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: CVPR, pp. 8697–8710. IEEE (2018) Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: CVPR, pp. 8697–8710. IEEE (2018)
Metadaten
Titel
SASBO: Sparse Attack via Stochastic Binary Optimization
verfasst von
Yihan Meng
Weitao Li
Lin Shang
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2242-6_10

Premium Partner