2020
DOI: 10.1609/aaai.v34i04.6173
|View full text |Cite
|
Sign up to set email alerts
|

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Abstract: Despite the great achievements of the modern deep neural networks (DNNs), the vulnerability/robustness of state-of-the-art DNNs raises security concerns in many application domains requiring high reliability. Various adversarial attacks are proposed to sabotage the learning performance of DNN models. Among those, the black-box adversarial attack methods have received special attentions owing to their practicality and simplicity. Black-box attacks usually prefer less queries in order to maintain stealthy and lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 17 publications
(26 reference statements)
0
24
0
Order By: Relevance
“…The authors employed the natural evolution strategy (NES) to estimate the gradient and adopted the projected gradient descent to generate adversarial examples. Based on [26] , Zhao et al [27] derived the Fisher information matrix (FIM) and incorporated FIM with the second-order natural gradient descent (NGD) to achieve high query-efficiency.…”
Section: A Adversarial Attack Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors employed the natural evolution strategy (NES) to estimate the gradient and adopted the projected gradient descent to generate adversarial examples. Based on [26] , Zhao et al [27] derived the Fisher information matrix (FIM) and incorporated FIM with the second-order natural gradient descent (NGD) to achieve high query-efficiency.…”
Section: A Adversarial Attack Methodsmentioning
confidence: 99%
“…Finally, transformation based attack [33], [34], [35], [36] crafts adversarial images by shifting pixels' spatial location [27] Boundary Attack [28] Pointwise Attack [29] Boundary Attack ++ [30] HSJA [31] QEBA [32] stAdv [33] Engstrom et al [34] Wang et al [35] Chen et al [36] instead of directly modifying their value. For example, Xiao et al [33] proposed the spatially transformed adversarial (stAdv) method, which replaces the L p -norm with local geometry distortion in measuring the magnitude of perturbations.…”
Section: A Adversarial Attack Methodsmentioning
confidence: 99%
“…New score based attacks include qMeta [24], P-RGF [25], ZO-ADMM [26], TREMBA [27], Square attack [28], ZO-NGD [29] and PPBA [30].…”
Section: B Black-box Attack Categorizationmentioning
confidence: 99%
“…We cover 7 recently proposed score type attacks. These attacks include the square attack [28], the Zeroth-Order Natural Gradient Descent attack (ZO-NGD) [29], the Projection and Policy Driven Attack (PPBA) [30], the Zerothorder Optimization Alternating Direction Method of Multiplers (ZO-ADMM) attack [26], the prior-guided random gradient-free (P-RGF) attack [25], the TRansferable EMbedding based Black-box Attack (TREMBA) [27] and the qMeta attack [24].…”
Section: Score Based Attacksmentioning
confidence: 99%
See 1 more Smart Citation