Towards Query Efficient Black-box Attacks: An Input-free Perspective
@article{Du2018TowardsQE, title={Towards Query Efficient Black-box Attacks: An Input-free Perspective}, author={Yali Du and Meng Fang and Jinfeng Yi and J. Cheng and D. Tao}, journal={Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security}, year={2018} }
Recent studies have highlighted that deep neural networks (DNNs) are vulnerable to adversarial attacks, even in a black-box scenario. [...] Key Method Following this approach, we propose two techniques to significantly reduce the query complexity. First, we initialize an adversarial example with a gray color image on which every pixel has roughly the same importance for the target model. Then we shrink the dimension of the attack space by perturbing a small region and tiling it to cover the input image.Expand
Supplemental Code
Github Repo
Via Papers with Code
Towards Query Efficient Black-box Attacks: An Input-free Perspective
Figures, Tables, and Topics from this paper
12 Citations
A Study of Black Box Adversarial Attacks in Computer Vision
- Computer Science, Mathematics
- ArXiv
- 2019
- 6
- PDF
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
- Computer Science, Mathematics
- CCS
- 2019
- 20
- Highly Influenced
- PDF
Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization
- Computer Science
- ArXiv
- 2021
- PDF
The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
- Computer Science, Mathematics
- 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
- 2019
- 10
- PDF
Making Targeted Black-box Evasion Attacks Effective and Efficient
- Computer Science, Mathematics
- AISec@CCS
- 2019
- 2
- PDF
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning
- Computer Science, Mathematics
- ArXiv
- 2020
- PDF
Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin
- Computer Science, Mathematics
- ArXiv
- 2019
- 4
- PDF
Enhancing the Robustness of Neural Collaborative Filtering Systems Under Malicious Attacks
- Computer Science
- IEEE Transactions on Multimedia
- 2019
- 10
References
SHOWING 1-7 OF 7 REFERENCES
Black-box Adversarial Attacks with Limited Queries and Information
- Computer Science, Mathematics
- ICML
- 2018
- 398
- Highly Influential
- PDF
Towards Evaluating the Robustness of Neural Networks
- Computer Science
- 2017 IEEE Symposium on Security and Privacy (SP)
- 2017
- 3,182
- Highly Influential
- PDF
Deep neural networks are easily fooled: High confidence predictions for unrecognizable images
- Computer Science
- 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
- 2015
- 1,873
- Highly Influential
- PDF
Rethinking the Inception Architecture for Computer Vision
- Computer Science
- 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
- 2016
- 10,635
- Highly Influential
- PDF
ImageNet: A large-scale hierarchical image database
- 2009 IEEE Conference on Computer Vision and Pattern Recognition
- 2009
- 7,046
- Highly Influential
- PDF
Natural Evolution Strategies
- Mathematics, Computer Science
- 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)
- 2008
- 486
- Highly Influential
- PDF
Evolution Strategies as a Scalable Alternative to Reinforcement Learning
- Mathematics, Computer Science
- ArXiv
- 2017
- 762
- Highly Influential
- PDF