论文标题
对DNN的实用无箱对抗攻击
Practical No-box Adversarial Attacks against DNNs
论文作者
论文摘要
深神经网络(DNN)的对抗脆弱性的研究迅速发展。现有攻击需要内部访问(对受害者模型的体系结构,参数或培训集)或外部访问(以查询模型)。但是,在许多情况下,这两个访问都可能是不可行的或昂贵的。我们调查了No-Box的对抗示例,攻击者无法访问模型信息或培训集,也无法查询模型。取而代之的是,攻击者只能从与受害者模型相同的问题域中收集少量示例。如此强大的威胁模型大大扩展了对抗攻击的适用性。我们提出了三种使用非常小的数据集训练的机制(根据数十例的顺序),发现原型重建是最有效的。我们的实验表明,原型自动编码模型制作的对抗性例子很好地转移到了各种图像分类和面部验证模型。在Clarifai.com持有的商业名人识别系统上,我们的方法大大降低了系统的平均预测准确性,仅为15.40%,这与从预先训练的街道模型传递对抗性示例的攻击相当。
The study of adversarial vulnerabilities of deep neural networks (DNNs) has progressed rapidly. Existing attacks require either internal access (to the architecture, parameters, or training set of the victim model) or external access (to query the model). However, both the access may be infeasible or expensive in many scenarios. We investigate no-box adversarial examples, where the attacker can neither access the model information or the training set nor query the model. Instead, the attacker can only gather a small number of examples from the same problem domain as that of the victim model. Such a stronger threat model greatly expands the applicability of adversarial attacks. We propose three mechanisms for training with a very small dataset (on the order of tens of examples) and find that prototypical reconstruction is the most effective. Our experiments show that adversarial examples crafted on prototypical auto-encoding models transfer well to a variety of image classification and face verification models. On a commercial celebrity recognition system held by clarifai.com, our approach significantly diminishes the average prediction accuracy of the system to only 15.40%, which is on par with the attack that transfers adversarial examples from a pre-trained Arcface model.