Query-Efficient Hard-Label Black-Box Attacks Using Biased Sampling

Sijia Liu, Jian Sun, Jun Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

In recent years, deep learning has developed rapidly and achieved great success in many fields. However, it has been demonstrated that deep neural networks are very vulnerable to artificially designed adversarial examples which are difficult to visually observe by human. In this paper, the practical hard-label black box attack in which attackers can only query the output labels to generate adversarial examples, is studied on image classification tasks. Existing attacks proposed for this setting require a lot of queries. To improve the attack efficiency, the unbiased sampling in existing attacks is replaced with two biased sampling methods: low image frequency and regional mask. The two biased methods integrate domain knowledge into the process of sampling and searching for adversarial directions, which can significantly limit the search space and thus reduce query times. Experimental results on ImageNet show that the biased sampling methods can improve the efficiency of existing hard-label black box attacks.

Original languageEnglish
Title of host publicationProceedings - 2020 Chinese Automation Congress, CAC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3872-3877
Number of pages6
ISBN (Electronic)9781728176871
DOIs
Publication statusPublished - 6 Nov 2020
Event2020 Chinese Automation Congress, CAC 2020 - Shanghai, China
Duration: 6 Nov 20208 Nov 2020

Publication series

NameProceedings - 2020 Chinese Automation Congress, CAC 2020

Conference

Conference2020 Chinese Automation Congress, CAC 2020
Country/TerritoryChina
CityShanghai
Period6/11/208/11/20

Keywords

  • Adversarial example
  • Biased sampling
  • Black box Attack
  • Deep neural network
  • Image frequency

Fingerprint

Dive into the research topics of 'Query-Efficient Hard-Label Black-Box Attacks Using Biased Sampling'. Together they form a unique fingerprint.

Cite this