TY - JOUR
T1 - A Novel Multi-Sample Generation Method for Adversarial Attacks
AU - Duan, Mingxing
AU - Li, Kenli
AU - Deng, Jiayan
AU - Xiao, Bin
AU - Tian, Qi
N1 - Funding Information:
This work was supported in part by the National Key-Research and Development Program of China under Grant No. 2020YFB2104003, in part by the Open Fund of Science and Technology on Parallel and Distributed Processing Laboratory under Grant 6142110200205, in part by the Shenzhen Excellent Technological and Innovative Talent Training Foundation under Grant RCBS20200714114941176, in part by the Science and Education Joint Project of Natural Science Foundation of Hunan Province under Grant 2020JJ7056. This article is funded by the Hong Kong Scholars Program under Grants XJ2020032. Authors’ addresses: M. Duan, Hunan University, School of Information Science and Engineering, Changsha, Hunan 410000, China; email: [email protected]; K. Li (corresponding author), Hunan University, School of Logistics Information, Changsha, Hunan 410000, China; email: [email protected]; J. Deng (corresponding author), Hunan Modern Logistics College, School of Information Science and Engineering, Changsha, Hunan 410000, China; email: [email protected]; B. Xiao, Department of Computing, Hong Kong Polytechnic University, Hong Kong 99907, China; email: [email protected]; Q. Tian, Cloud BU, Huawei, Shenzhen 518129, China; email: [email protected]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 2022 Association for Computing Machinery. 1551-6857/2022/02-ART112 $15.00 https://doi.org/10.1145/3506852
Publisher Copyright:
© 2022 Association for Computing Machinery.
PY - 2022/11
Y1 - 2022/11
N2 - Deep learning models are widely used in daily life, which bring great convenience to our lives, but they are vulnerable to attacks. How to build an attack system with strong generalization ability to test the robustness of deep learning systems is a hot issue in current research, among which the research on black-box attacks is extremely challenging. Most current research on black-box attacks assumes that the input dataset is known. However, in fact, it is difficult for us to obtain detailed information for those datasets. In order to solve the above challenges, we propose a multi-sample generation model for black-box model attacks, called MsGM. MsGM is mainly composed of three parts: multi-sample generation, substitute model training, and adversarial sample generation and attack. Firstly, we design a multi-task generation model to learn the distribution of the original dataset. The model first converts an arbitrary signal of a certain distribution into the shared features of the original dataset through deconvolution operations, and then according to different input conditions, multiple identical sub-networks generate the corresponding targeted samples. Secondly, the generated sample features achieve different outputs through querying the black-box model and training the substitute model, which are used to construct different loss functions to optimize and update the generator and substitute model. Finally, some common white-box attack methods are used to attack the substitute model to generate corresponding adversarial samples, which are utilized to attack the black-box model. We conducted a large number of experiments on the MNIST and CIFAR-10 datasets. The experimental results show that under the same settings and attack algorithms, MsGM achieves better performance than the based models.
AB - Deep learning models are widely used in daily life, which bring great convenience to our lives, but they are vulnerable to attacks. How to build an attack system with strong generalization ability to test the robustness of deep learning systems is a hot issue in current research, among which the research on black-box attacks is extremely challenging. Most current research on black-box attacks assumes that the input dataset is known. However, in fact, it is difficult for us to obtain detailed information for those datasets. In order to solve the above challenges, we propose a multi-sample generation model for black-box model attacks, called MsGM. MsGM is mainly composed of three parts: multi-sample generation, substitute model training, and adversarial sample generation and attack. Firstly, we design a multi-task generation model to learn the distribution of the original dataset. The model first converts an arbitrary signal of a certain distribution into the shared features of the original dataset through deconvolution operations, and then according to different input conditions, multiple identical sub-networks generate the corresponding targeted samples. Secondly, the generated sample features achieve different outputs through querying the black-box model and training the substitute model, which are used to construct different loss functions to optimize and update the generator and substitute model. Finally, some common white-box attack methods are used to attack the substitute model to generate corresponding adversarial samples, which are utilized to attack the black-box model. We conducted a large number of experiments on the MNIST and CIFAR-10 datasets. The experimental results show that under the same settings and attack algorithms, MsGM achieves better performance than the based models.
KW - Black-box attacks
KW - GAN
KW - multi-task
KW - substitute model
UR - http://www.scopus.com/inward/record.url?scp=85127580702&partnerID=8YFLogxK
U2 - 10.1145/3506852
DO - 10.1145/3506852
M3 - Journal article
AN - SCOPUS:85127580702
SN - 1551-6857
VL - 18
SP - 1
EP - 21
JO - ACM Transactions on Multimedia Computing, Communications and Applications
JF - ACM Transactions on Multimedia Computing, Communications and Applications
IS - 4
M1 - 112
ER -